CVE-2021-20088: mootools-more vulnerable to prototype pollution
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.63781%
CWE
Published
5/24/2022
Updated
4/22/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| mootools-more | npm | <= 1.6.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the parseQueryString function's handling of query parameters. The code uses unvalidated user input to create object properties through path traversal (keys array processing). The PoC demonstrates that supplying proto or constructor[prototype] in query parameters pollutes the base object prototype. The GitHub advisory and NVD description both confirm this is the attack vector, and the BlackFan analysis explicitly shows the vulnerable code path in String.QueryString.js line 46.