CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-27415: Nuxt allows DOS via cache poisoning with payload rendering response

7.5 CVSS

Description

Nuxt is an open-source web development framework for Vue.js. Prior to 3.16.0, by sending a crafted HTTP request to a server behind an CDN, it is possible in some circumstances to poison the CDN cache and highly impacts the availability of a site. It is possible to craft a request, such as https://mysite.com/?/_payload.json which will be rendered as JSON. If the CDN in front of a Nuxt site ignores the query string when determining whether to cache a route, then this JSON response could be served to future visitors to the site. An attacker can perform this attack to a vulnerable site in order to make a site unavailable indefinitely. It is also possible in the case where the cache will be reset to make a small script to send a request each X seconds (=caching duration) so that the cache is permanently poisoned making the site completely unavailable. This vulnerability is fixed in 3.16.0.

Classification

CVE ID: CVE-2025-27415

CVSS Base Severity: HIGH

CVSS Base Score: 7.5

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem Types

CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data

Affected Products

Vendor: nuxt

Product: nuxt

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.34% (probability of being exploited)

EPSS Percentile: 55.94% (scored less or equal to compared to others)

EPSS Date: 2025-04-17 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: none

SSVC Technical Impact: partial

SSVC Automatable: true

References

https://nvd.nist.gov/vuln/detail/CVE-2025-27415
https://github.com/nuxt/nuxt/security/advisories/GHSA-jvhm-gjrh-3h93

Timeline