CVE-2025-8082 (GCVE-0-2025-8082)

Vulnerability from cvelistv5 – Published: 2025-12-12 18:33 – Updated: 2025-12-12 19:08
VLAI?
Summary
Improper neutralization of the title date in the 'VDatePicker' component in Vuetify, allows unsanitized HTML to be inserted into the page. This can lead to a Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss  attack. The vulnerability occurs because the 'title-date-format' property of the 'VDatePicker' can accept a user created function and assign its output to the 'innerHTML' property of the title element without sanitization. This issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0. Note: Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here https://v2.vuetifyjs.com/en/about/eol/ .
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
References
Impacted products
Vendor Product Version
N/A Vuetify Affected: >=2.0.0 <3.0.0 (semver)
Create a notification for this product.
Credits
Christiaan Swiers
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-8082",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-12T19:04:05.872919Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-12T19:08:54.180Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://registry.npmjs.org",
          "defaultStatus": "unaffected",
          "packageName": "vuetify",
          "product": "Vuetify",
          "repo": "https://github.com/vuetifyjs/vuetify",
          "vendor": "N/A",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e=2.0.0 \u003c3.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Christiaan Swiers"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: transparent;\"\u003eImproper neutralization of the title date in the \u0027\u003ctt\u003eVDatePicker\u003c/tt\u003e\u0027 component in Vuetify, allows unsanitized HTML to be inserted into the page.\u0026nbsp;This can lead to a \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://owasp.org/www-community/attacks/xss\"\u003eCross-Site Scripting (XSS)\u003c/a\u003e\u0026nbsp;attack. The vulnerability occurs because the\u0026nbsp;\u0027\u003ctt\u003etitle-date-format\u003c/tt\u003e\u0027 property of the \u0027\u003ctt\u003eVDatePicker\u003c/tt\u003e\u0027 can accept a user created function and assign its output to the \u0027\u003ctt\u003einnerHTML\u003c/tt\u003e\u0027 property of the title element without sanitization.\u003c/span\u003e\u003cbr\u003e\u003cbr\u003eThis issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0.\u003cbr\u003e\u003cbr\u003e\u003cb\u003eNote:\u003c/b\u003e\u003cbr\u003eVersion 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://v2.vuetifyjs.com/en/about/eol/\"\u003ehere\u003c/a\u003e."
            }
          ],
          "value": "Improper neutralization of the title date in the \u0027VDatePicker\u0027 component in Vuetify, allows unsanitized HTML to be inserted into the page.\u00a0This can lead to a  Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss \u00a0attack. The vulnerability occurs because the\u00a0\u0027title-date-format\u0027 property of the \u0027VDatePicker\u0027 can accept a user created function and assign its output to the \u0027innerHTML\u0027 property of the title element without sanitization.\n\nThis issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0.\n\nNote:\nVersion 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see  here https://v2.vuetifyjs.com/en/about/eol/ ."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-63",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-63 Cross-Site Scripting (XSS)"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-12T18:33:07.244Z",
        "orgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
        "shortName": "HeroDevs"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.herodevs.com/vulnerability-directory/cve-2025-8082"
        },
        {
          "tags": [
            "technical-description",
            "exploit"
          ],
          "url": "https://codepen.io/herodevs/pen/dPYGPyR/775285c0fd5a08038d4c85398815d644"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "unsupported-when-assigned",
        "x_open-source"
      ],
      "title": "Vuetify XSS via unsanitized \u0027titleDateFormat\u0027 in \u0027VDatePicker\u0027",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36c7be3b-2937-45df-85ea-ca7133ea542c",
    "assignerShortName": "HeroDevs",
    "cveId": "CVE-2025-8082",
    "datePublished": "2025-12-12T18:33:07.244Z",
    "dateReserved": "2025-07-23T13:08:25.958Z",
    "dateUpdated": "2025-12-12T19:08:54.180Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-8082\",\"sourceIdentifier\":\"36c7be3b-2937-45df-85ea-ca7133ea542c\",\"published\":\"2025-12-12T19:16:04.097\",\"lastModified\":\"2025-12-15T18:22:40.637\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[{\"sourceIdentifier\":\"36c7be3b-2937-45df-85ea-ca7133ea542c\",\"tags\":[\"unsupported-when-assigned\"]}],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper neutralization of the title date in the \u0027VDatePicker\u0027 component in Vuetify, allows unsanitized HTML to be inserted into the page.\u00a0This can lead to a  Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss \u00a0attack. The vulnerability occurs because the\u00a0\u0027title-date-format\u0027 property of the \u0027VDatePicker\u0027 can accept a user created function and assign its output to the \u0027innerHTML\u0027 property of the title element without sanitization.\\n\\nThis issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0.\\n\\nNote:\\nVersion 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see  here https://v2.vuetifyjs.com/en/about/eol/ .\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"36c7be3b-2937-45df-85ea-ca7133ea542c\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L\",\"baseScore\":6.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":3.4}]},\"weaknesses\":[{\"source\":\"36c7be3b-2937-45df-85ea-ca7133ea542c\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"references\":[{\"url\":\"https://codepen.io/herodevs/pen/dPYGPyR/775285c0fd5a08038d4c85398815d644\",\"source\":\"36c7be3b-2937-45df-85ea-ca7133ea542c\"},{\"url\":\"https://www.herodevs.com/vulnerability-directory/cve-2025-8082\",\"source\":\"36c7be3b-2937-45df-85ea-ca7133ea542c\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-8082\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-12-12T19:04:05.872919Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-12-12T19:08:50.336Z\"}}], \"cna\": {\"tags\": [\"unsupported-when-assigned\", \"x_open-source\"], \"title\": \"Vuetify XSS via unsanitized \u0027titleDateFormat\u0027 in \u0027VDatePicker\u0027\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Christiaan Swiers\"}], \"impacts\": [{\"capecId\": \"CAPEC-63\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-63 Cross-Site Scripting (XSS)\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://github.com/vuetifyjs/vuetify\", \"vendor\": \"N/A\", \"product\": \"Vuetify\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e=2.0.0 \u003c3.0.0\", \"versionType\": \"semver\"}], \"packageName\": \"vuetify\", \"collectionURL\": \"https://registry.npmjs.org\", \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.herodevs.com/vulnerability-directory/cve-2025-8082\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://codepen.io/herodevs/pen/dPYGPyR/775285c0fd5a08038d4c85398815d644\", \"tags\": [\"technical-description\", \"exploit\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.5.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Improper neutralization of the title date in the \u0027VDatePicker\u0027 component in Vuetify, allows unsanitized HTML to be inserted into the page.\\u00a0This can lead to a  Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss \\u00a0attack. The vulnerability occurs because the\\u00a0\u0027title-date-format\u0027 property of the \u0027VDatePicker\u0027 can accept a user created function and assign its output to the \u0027innerHTML\u0027 property of the title element without sanitization.\\n\\nThis issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0.\\n\\nNote:\\nVersion 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see  here https://v2.vuetifyjs.com/en/about/eol/ .\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: transparent;\\\"\u003eImproper neutralization of the title date in the \u0027\u003ctt\u003eVDatePicker\u003c/tt\u003e\u0027 component in Vuetify, allows unsanitized HTML to be inserted into the page.\u0026nbsp;This can lead to a \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://owasp.org/www-community/attacks/xss\\\"\u003eCross-Site Scripting (XSS)\u003c/a\u003e\u0026nbsp;attack. The vulnerability occurs because the\u0026nbsp;\u0027\u003ctt\u003etitle-date-format\u003c/tt\u003e\u0027 property of the \u0027\u003ctt\u003eVDatePicker\u003c/tt\u003e\u0027 can accept a user created function and assign its output to the \u0027\u003ctt\u003einnerHTML\u003c/tt\u003e\u0027 property of the title element without sanitization.\u003c/span\u003e\u003cbr\u003e\u003cbr\u003eThis issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0.\u003cbr\u003e\u003cbr\u003e\u003cb\u003eNote:\u003c/b\u003e\u003cbr\u003eVersion 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://v2.vuetifyjs.com/en/about/eol/\\\"\u003ehere\u003c/a\u003e.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"36c7be3b-2937-45df-85ea-ca7133ea542c\", \"shortName\": \"HeroDevs\", \"dateUpdated\": \"2025-12-12T18:33:07.244Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-8082\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-12-12T19:08:54.180Z\", \"dateReserved\": \"2025-07-23T13:08:25.958Z\", \"assignerOrgId\": \"36c7be3b-2937-45df-85ea-ca7133ea542c\", \"datePublished\": \"2025-12-12T18:33:07.244Z\", \"assignerShortName\": \"HeroDevs\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…