Miggo Logo

CVE-2025-28269:
js-object-utilities Vulnerable to Prototype Pollution

N/A

CVSS Score

Basic Information

EPSS Score
-
Published
4/7/2025
Updated
4/14/2025
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
vuln_not_found
Package NameEcosystemVulnerable VersionsFirst Patched Version
js-object-utilitiesnpm< 2.2.12.2.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability is explicitly located in the set.js module exports as per advisory. The patch shows:

  1. A security check was added to abort processing if proto/constructor exist in keyParts
  2. A previous security check on finalKey (line 16:29 in original) was removed as redundant
  3. The PoC demonstrates exploitation via Reflect.apply(lib.set)
  4. The test case modification confirms the vulnerable execution path was through the set function This function is the direct entry point for processing user-controlled key paths and was missing prototype pollution guards in vulnerable versions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**Vuln*r**ility typ*:** Prototyp* Pollution *******t** P**k***:** * Pro*u*t: js-o*j**t-utiliti*s * V*rsion: *.*.* **R*m**y:** Up**t* p**k*** to v*rsion *.*.*. **Vuln*r**ility Lo**tion(s):** ```js *t mo*ul*.*xports (/no**_mo*ul*s/js-o*j**t-utiliti

Reasoning

T** vuln*r**ility is *xpli*itly lo**t** in t** s*t.js mo*ul* *xports *s p*r **visory. T** p*t** s*ows: *. * s**urity ****k w*s ***** to **ort pro**ssin* i* __proto__/*onstru*tor *xist in k*yP*rts *. * pr*vious s**urity ****k on *in*lK*y (lin* **:**