CVE-2025-28269:
js-object-utilities Vulnerable to Prototype Pollution
N/A
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
4/7/2025
Updated
4/14/2025
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
vuln_not_found
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
js-object-utilities | npm | < 2.2.1 | 2.2.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability is explicitly located in the set.js module exports as per advisory. The patch shows:
- A security check was added to abort processing if proto/constructor exist in keyParts
- A previous security check on finalKey (line 16:29 in original) was removed as redundant
- The PoC demonstrates exploitation via Reflect.apply(lib.set)
- The test case modification confirms the vulnerable execution path was through the set function This function is the direct entry point for processing user-controlled key paths and was missing prototype pollution guards in vulnerable versions.