CVE-2025-57329
Description
web3-core-method is a package designed to creates the methods on the web3 modules. A Prototype Pollution vulnerability in the attachToObject function of web3-core-method version 1.10.4 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Prototype Pollution in web3-core-method <=1.10.4 allows attackers to inject properties into Object.prototype, leading to denial of service.
The attachToObject function in web3-core-method versions 1.10.4 and earlier is vulnerable to Prototype Pollution due to improper sanitization of user-supplied input. This allows attackers to inject arbitrary properties, such as __proto__, into the prototype chain of JavaScript objects [2][3].
An attacker can exploit this by supplying a crafted payload to any application using the affected module, without requiring authentication. The vulnerability arises from the insecure handling of constructor arguments in the method initialization process [3].
The minimum consequence is denial of service (DoS), but depending on the application context, it may lead to arbitrary code execution or unintended behavior. The vulnerability is classified under CWE-1321 (Improperly Controlled Modification of Object Prototype Attributes) [3].
web3.js version 1.x entered an end-of-maintenance phase starting January 1, 2024, with no new bug fixes after April 1, 2024, and security fixes discontinued after July 1, 2024 [1]. Users are strongly advised to upgrade to version 4.x to mitigate this vulnerability.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
web3-core-methodnpm | <= 1.10.3 | — |
Affected products
2- web3-core-method/web3-core-methoddescription
- Range: <=1.10.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-2j4c-9qqq-896rghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-57329ghsaADVISORY
- github.com/VulnSageAgent/PoCs/blob/main/JavaScript/prototype-pollution/web3-core-method%401.10.4/index.jsghsaWEB
- github.com/VulnSageAgent/PoCs/tree/main/JavaScript/prototype-pollution/CVE-2025-57329ghsaWEB
- github.com/web3/web3.js/tree/1.xghsaPACKAGE
News mentions
0No linked articles in our index yet.