Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. vuetify
  4. ›
  5. CVE-2025-8083

CVE-2025-8083: Vuetify has a Prototype Pollution vulnerability

December 12, 2025

The Preset configuration feature of Vuetify is vulnerable to Prototype Pollution due to the internal ‘mergeDeep’ utility function used to merge options with defaults. Using a specially-crafted, malicious preset can result in polluting all JavaScript objects with arbitrary properties, which can further negatively affect all aspects of the application’s behavior. This can lead to a wide range of security issues, including resource exhaustion/denial of service or unauthorized access to data.

If the application utilizes Server-Side Rendering (SSR), this vulnerability could affect the whole server process.

This issue affects Vuetify versions greater than or equal to 2.2.0-beta.2 and less than 3.0.0-alpha.10.

Note: Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here https://v2.vuetifyjs.com/en/about/eol/ .

References

  • codepen.io/herodevs/pen/RNWoaQM/f1f4ccc7e6a307c2a8c36d948ba14755
  • github.com/advisories/GHSA-3jp5-5f8r-q2wg
  • github.com/vuetifyjs/vuetify
  • nvd.nist.gov/vuln/detail/CVE-2025-8083
  • www.herodevs.com/vulnerability-directory/cve-2025-8083

Code Behaviors & Features

Detect and mitigate CVE-2025-8083 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.2.0-beta.2 before 3.0.0-alpha.10

Fixed versions

  • 3.0.0-alpha.10

Solution

Upgrade to version 3.0.0-alpha.10 or above.

Impact 8.6 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

Learn more about CVSS

Weakness

  • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

Source file

npm/vuetify/CVE-2025-8083.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sun, 14 Dec 2025 00:20:00 +0000.