-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from how 'requestedVersion' is processed in convertLater. The function stores callback functions using user-controlled 'requestedVersion' as an object key without prototype protection. When attackers provide malicious version strings like 'proto', they can modify the prototype chain. This matches the CWE-1321 pattern of improper prototype modification. The GitHub advisory specifically calls out 'requestedVersion' in npm-convert.js as the injection vector, and the code shows direct use of this variable in key assignment without safe property checks.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| steal | npm | <= 2.3.0 |
Ongoing coverage of React2Shell