CVE-2025-27415
Nuxt allows DOS via cache poisoning with payload rendering response
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Nuxt is an open-source web development framework for Vue.js. Prior to 3.16.0, by sending a crafted HTTP request to a server behind an CDN, it is possible in some circumstances to poison the CDN cache and highly impacts the availability of a site. It is possible to craft a request, such as https://mysite.com/?/_payload.json which will be rendered as JSON. If the CDN in front of a Nuxt site ignores the query string when determining whether to cache a route, then this JSON response could be served to future visitors to the site. An attacker can perform this attack to a vulnerable site in order to make a site unavailable indefinitely. It is also possible in the case where the cache will be reset to make a small script to send a request each X seconds (=caching duration) so that the cache is permanently poisoned making the site completely unavailable. This vulnerability is fixed in 3.16.0.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2025-02-24 CVE Reserved
- 2025-03-19 CVE Published
- 2025-03-19 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://github.com/nuxt/nuxt/security/advisories/GHSA-jvhm-gjrh-3h93 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Nuxt Search vendor "Nuxt" | Nuxt Search vendor "Nuxt" for product "Nuxt" | >= 3.0.0 < 3.16.0 Search vendor "Nuxt" for product "Nuxt" and version " >= 3.0.0 < 3.16.0" | en |
Affected
|