VYPR
Low severityNVD Advisory· Published Sep 24, 2025· Updated Sep 26, 2025

CVE-2025-57327

CVE-2025-57327

Description

spmrc is a package that provides the rc manager for spm. A Prototype Pollution vulnerability in the set and config function of spmrc version 1.2.0 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A prototype pollution vulnerability in spmrc versions ≤1.2.0 allows attackers to inject properties into Object.prototype via crafted payloads, leading to denial of service.

Vulnerability

Overview

The spmrc package, which provides the rc manager for spm, contains a Prototype Pollution vulnerability in its set() and config() functions. The root cause is improper handling of property assignments when processing user-supplied input containing nested property paths such as __proto__.pollutedProp. This allows attackers to inject arbitrary properties into the prototype of built-in JavaScript objects [1][3].

Exploitation

An attacker can exploit this by providing a crafted payload to the set() or config() method of spmrc. These functions are designed to set configuration values using dot-separated keys (e.g., user.username), but they do not sanitize or block prototype-related keys. Any application that passes untrusted input to these functions is vulnerable. No authentication or special network position is required beyond the ability to supply input to the affected methods [2][3].

Impact

The minimum consequence is denial of service (DoS) due to unexpected behavior of objects that rely on unmodified prototypes. In contexts where prototype pollution can be leveraged further, arbitrary code execution may be possible, as the polluted prototype can affect all objects in the runtime [1][3].

Mitigation

Status

As of the publication date, no official patch has been released for spmrc version 1.2.0 or earlier. Users are advised to avoid passing untrusted input to the set() and config() functions, or to consider replacing the package with an alternative that properly sanitizes prototype keys [1][3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
spmrcnpm
<= 1.2.0

Affected products

2
  • spmrc/spmrcdescription
  • spmrc/spmrcllm-create
    Range: <=1.2.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.