Plattform
nodejs
Komponente
nuxt
Behoben in
3.6.1
4.0.1
3.19.0
CVE-2025-59414 describes a client-side path traversal vulnerability discovered in Nuxt, a popular Vue.js framework. This flaw allows attackers to manipulate client-side requests, potentially gaining access to unintended endpoints within the same application domain. The vulnerability affects versions 3.18.0 and earlier, and a fix is available in Nuxt 3.19.0.
The core of the vulnerability lies in how Nuxt Islands are fetched during prerendering. When an API endpoint returns user-controlled data containing a serialized _nuxtisland object, the client-side payload revival process can be exploited. By crafting malicious data within this object, an attacker can influence the path resolution, effectively bypassing intended access controls. This allows them to potentially access sensitive data or execute unauthorized actions on the server, depending on the exposed endpoints. The blast radius is limited to the application domain, but the potential for data exposure and unauthorized actions warrants immediate attention.
This vulnerability was publicly disclosed on 2025-09-17. No public proof-of-concept (POC) code has been released at the time of writing. The CVSS score is LOW, indicating a relatively low probability of exploitation in the wild, but the potential impact warrants proactive mitigation. It is not currently listed on the CISA KEV catalog.
Applications built with Nuxt 3.18.0 or earlier are at risk. This includes projects utilizing the Island architecture and relying on user-controlled data within API responses. Shared hosting environments where Nuxt applications are deployed alongside other applications could also be affected if the vulnerability is exploited to gain access to other resources.
• nodejs / server:
find /path/to/nuxt/app -name 'revive-payload.client.ts' -print• nodejs / server:
grep -r '__nuxt_island' /path/to/nuxt/app• generic web:
Inspect API responses for the presence of serialized _nuxtisland objects. Examine access logs for unusual file requests or patterns indicative of path traversal attempts.
disclosure
Exploit-Status
EPSS
0.05% (15% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation is to upgrade to Nuxt.js version 3.19.0 or later, which includes a fix for this vulnerability. If upgrading is not immediately feasible, consider implementing stricter input validation on API endpoints that return serialized _nuxtisland objects. This can involve sanitizing user-controlled data to prevent path manipulation. Additionally, review and restrict access to sensitive endpoints to minimize the potential impact of a successful attack. After upgrade, confirm by inspecting the Nuxt.js version using npm list nuxt or yarn list nuxt.
Aktualisieren Sie Nuxt auf Version 3.19.0 oder höher, oder auf Version 4.1.0 oder höher. Dies behebt die Path-Traversal-Schwachstelle im Nuxt Islands Payload Revival-Mechanismus. Das Update kann über npm oder yarn durchgeführt werden.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-59414 is a client-side path traversal vulnerability in Nuxt versions 3.18.0 and below, allowing attackers to access unauthorized endpoints.
If you are using Nuxt version 3.18.0 or earlier, you are potentially affected by this vulnerability.
Upgrade to Nuxt version 3.19.0 or later to remediate the vulnerability. Consider input validation as a temporary workaround.
There are currently no confirmed reports of active exploitation, but the vulnerability's nature suggests it could be exploited once a proof-of-concept is available.
Refer to the official Nuxt security advisory for detailed information and updates: [https://nuxt.com/security/CVE-2025-59414](https://nuxt.com/security/CVE-2025-59414)
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.