Client-Side Path Traversal Vulnerability in Nuxt Framework by Nuxt Technologies
CVE-2025-59414

3.1LOW

Key Information:

Vendor

Nuxt

Status
Vendor
CVE Published:
17 September 2025

What is CVE-2025-59414?

A client-side path traversal vulnerability exists in Nuxt, an open-source web development framework for Vue.js. This vulnerability allows attackers to exploit the Island payload revival mechanism, manipulating client-side requests to unintended endpoints within the application domain under specific prerendering conditions. The issue arises in the revive-payload client process, where user-controlled data can lead to serialized __nuxt_island objects stored in the prerendered pages. As a result, attackers can inject crafted paths into these serialized objects, enabling unauthorized access to sensitive content. Users are recommended to update to Nuxt version 3.19.0 or higher, or 4.1.0 or higher to mitigate this vulnerability.

Affected Version(s)

nuxt >= 3.6.0 < 3.19.0 < 3.6.0 3.19.0

nuxt >= 4.0.0 < 4.1.0 < 4.0.0 4.1.0

References

CVSS V3.1

Score:
3.1
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-59414 : Client-Side Path Traversal Vulnerability in Nuxt Framework by Nuxt Technologies