Cyber Posture

CVE-2025-8083

High

Published: 12 December 2025

Published
12 December 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
EPSS Score 0.0018 39.6th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-8083 is a high-severity Prototype Pollution (CWE-1321) vulnerability. Its CVSS base score is 8.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 39.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SA-22 (Unsupported System Components) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires identifying, reporting, and correcting flaws like this prototype pollution vulnerability in Vuetify by upgrading to a patched version.

prevent

Prohibits use of unsupported components such as EOL Vuetify 2.x, preventing exploitation of unpatched vulnerabilities like CVE-2025-8083.

prevent

Requires validation of preset configuration inputs to block specially-crafted malicious payloads that cause prototype pollution.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

CVE enables unauthenticated remote exploitation of a public-facing web application component (T1190) via prototype pollution, facilitating application-level DoS through resource exhaustion (T1499.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The Preset configuration https://v2.vuetifyjs.com/en/features/presets feature of Vuetify is vulnerable to Prototype Pollution https://cheatsheetseries.owasp.org/cheatsheets/Prototype_Pollution_Prevention_Cheat_Sheet.html due to the internal 'mergeDeep' utility function used to merge options with defaults. Using a specially-crafted, malicious preset can result in polluting all JavaScript objects with arbitrary…

more

properties, which can further negatively affect all aspects of the application's behavior. This can lead to a wide range of security issues, including resource exhaustion/denial of service or unauthorized access to data. If the application utilizes Server-Side Rendering (SSR), this vulnerability could affect the whole server process. This issue affects Vuetify versions greater than or equal to 2.2.0-beta.2 and less than 3.0.0-alpha.10. Note: Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here https://v2.vuetifyjs.com/en/about/eol/ .

Deeper analysisAI

CVE-2025-8083 is a prototype pollution vulnerability in the Preset configuration feature of Vuetify, a popular Vue.js UI library. The issue stems from the internal 'mergeDeep' utility function, which merges user-provided options with defaults and allows a specially crafted malicious preset to pollute the prototypes of all JavaScript objects with arbitrary properties. This affects Vuetify versions greater than or equal to 2.2.0-beta.2 and less than 3.0.0-alpha.10, potentially disrupting application behavior across client-side and server-side rendering (SSR) contexts, where SSR exploitation could impact the entire server process.

Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity and no user interaction required, as indicated by its CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H). By supplying a malicious preset, attackers can achieve a range of impacts, including resource exhaustion leading to denial of service, unauthorized data access, or other behavioral alterations in the affected application.

Advisories note that Vuetify 2.x is end-of-life and will not receive patches; users should refer to the official EOL announcement for details. Vulnerable applications should upgrade to Vuetify 3.0.0-alpha.10 or later. Proof-of-concept exploits are available via references such as the CodePen demonstration and the Herodevs vulnerability directory.

Details

CWE(s)

Affected Products

Vuetify
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2024-57080Shared CWE-1321
CVE-2026-30939Shared CWE-1321
CVE-2026-33993Shared CWE-1321
CVE-2024-57069Shared CWE-1321
CVE-2024-57066Shared CWE-1321
CVE-2024-57083Shared CWE-1321
CVE-2024-57067Shared CWE-1321
CVE-2026-30226Shared CWE-1321
CVE-2024-12629Shared CWE-1321
CVE-2024-57084Shared CWE-1321

References