CVE-2020-7709: Prototype pollution in json-pointer
6
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.76506%
CWE
Published
5/10/2021
Updated
3/5/2025
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
json-pointer | npm | < 0.6.1 | 0.6.1 |
org.webjars.npm:json-pointer | maven | < 0.6.1 | 0.6.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the set function's handling of JSON pointers. Before the patch, it lacked validation for prototype-pollution vectors in reference tokens. The GitHub PR #34 shows added checks for proto, constructor, and prototype in the token processing loop. The Snyk PoC demonstrates exploitation via pointer.set() with /proto/polluted, confirming this function was the entry point. The fix specifically modifies the set function's token handling logic, making it the clear vulnerable component.