Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2025-8083
Awaiting Analysis
More InfoOfficial Page
Source-36c7be3b-2937-45df-85ea-ca7133ea542c
View Known Exploited Vulnerability (KEV) details
Published At-12 Dec, 2025 | 20:15
Updated At-15 Dec, 2025 | 18:22

The Preset configuration https://v2.vuetifyjs.com/en/features/presets  feature of Vuetify is vulnerable to Prototype Pollution https://cheatsheetseries.owasp.org/cheatsheets/Prototype_Pollution_Prevention_Cheat_Sheet.html  due to the internal 'mergeDeep' utility function used to merge options with defaults. Using a specially-crafted, malicious preset can result in polluting all JavaScript objects with arbitrary properties, which can further negatively affect all aspects of the application's behavior. This can lead to a wide range of security issues, including resource exhaustion/denial of service or unauthorized access to data. If the application utilizes Server-Side Rendering (SSR), this vulnerability could affect the whole server process. This issue affects Vuetify versions greater than or equal to 2.2.0-beta.2 and less than 3.0.0-alpha.10. Note: Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here https://v2.vuetifyjs.com/en/about/eol/ .

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.18.6HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
Type: Secondary
Version: 3.1
Base score: 8.6
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-1321Secondary36c7be3b-2937-45df-85ea-ca7133ea542c
CWE ID: CWE-1321
Type: Secondary
Source: 36c7be3b-2937-45df-85ea-ca7133ea542c
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://codepen.io/herodevs/pen/RNWoaQM/f1f4ccc7e6a307c2a8c36d948ba1475536c7be3b-2937-45df-85ea-ca7133ea542c
N/A
https://www.herodevs.com/vulnerability-directory/cve-2025-808336c7be3b-2937-45df-85ea-ca7133ea542c
N/A
Hyperlink: https://codepen.io/herodevs/pen/RNWoaQM/f1f4ccc7e6a307c2a8c36d948ba14755
Source: 36c7be3b-2937-45df-85ea-ca7133ea542c
Resource: N/A
Hyperlink: https://www.herodevs.com/vulnerability-directory/cve-2025-8083
Source: 36c7be3b-2937-45df-85ea-ca7133ea542c
Resource: N/A
Change History
0Changes found

Details not found