VYPR
Medium severity5.3NVD Advisory· Published Sep 24, 2025· Updated Apr 15, 2026

CVE-2025-57352

CVE-2025-57352

Description

A vulnerability exists in the 'min-document' package prior to version 2.19.0, stemming from improper handling of namespace operations in the removeAttributeNS method. By processing malicious input involving the __proto__ property, an attacker can manipulate the prototype chain of JavaScript objects, leading to denial of service or arbitrary code execution. This issue arises from insufficient validation of attribute namespace removal operations, allowing unintended modification of critical object prototypes. The vulnerability remains unaddressed in the latest available version.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
min-documentnpm
< 2.19.12.19.1

Affected products

1

Patches

1
fe32e8da464c

Merge pull request #55 from jameswassink/fix/prototype-pollution-removeAttributeNS

https://github.com/Raynos/min-documentJake VerbatenNov 6, 2025via ghsa
1 file changed · +3 2
  • dom-element.js+3 2 modified
    @@ -128,9 +128,10 @@ DOMElement.prototype.getAttributeNS =
     
     DOMElement.prototype.removeAttributeNS =
         function _Element_removeAttributeNS(namespace, name) {
    +        // Safely access and delete the attribute
             var attributes = this._attributes[namespace];
    -        if (attributes) {
    -            delete attributes[name]
    +        if (attributes && Object.prototype.hasOwnProperty.call(attributes, name)) {
    +            delete attributes[name];
             }
         }
     
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.