CVE-2025-26278: dref is vulnerable to prototype pollution
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.11858%
CWE
Published
9/25/2025
Updated
9/26/2025
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| dref | npm | <= 0.1.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The analysis is based on the provided vulnerability description and the information from the Gist URL. The Gist provides a clear Proof of Concept (PoC) that demonstrates the prototype pollution vulnerability in the set function of the dref library. The PoC shows that calling lib.set(someObj, "__proto__.pollutedKey", 123) pollutes the object prototype. Although the source code of the package could not be retrieved, the detailed description and PoC from the Gist provide high confidence in identifying the vulnerable function as set in lib/index.js.
Vulnerable functions
setlib/index.js
The `set` function in `dref` is vulnerable to prototype pollution. It fails to sanitize the input path, allowing an attacker to traverse up to the `Object.prototype` and add or modify properties. This can lead to a denial of service or other vulnerabilities depending on the application's logic.