CVE-2023-26105:
mde utilities contains Prototype Pollution
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.19693%
CWE
Published
2/28/2023
Updated
3/8/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
utilities | npm | <= 1.0.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
- Multiple sources (GitHub Advisory, Snyk, NVD) explicitly identify _mix as the vulnerable function.
- The GitHub issue #29 demonstrates exploitation via i18n.loadLocale -> mixin -> _mix call chain.
- The _mix function's property assignment pattern (targ[p] = src[p]) matches known prototype pollution anti-patterns.
- The lack of prototype validation in _mix's merge logic allows proto manipulation, as shown in the PoC.
- i18n.loadLocale is included as it's the documented exploitation path that surfaces the vulnerable _mix function.