PT-2026-39322 · Unknown · Velocityjs
Published
2026-05-09
·
Updated
2026-05-09
·
CVE-2026-44966
CVSS v3.1
8.3
High
| Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L |
Name of the Vulnerable Software and Affected Versions
Velocity.js versions prior to 2.1.6
Description
A prototype pollution issue exists during the processing of #set directives in templates. The engine accepts arbitrary path keys and performs assignments in the
/src/compile/set.ts file using the logic (baseRef as Record<string, unknown>)[key] = val. Due to a lack of validation or filtering for sensitive keys such as proto, constructor, or prototype, an attacker can traverse the prototype chain and pollute the global Object.prototype. This can lead to Denial of Service (DoS) or Remote Code Execution (RCE) depending on the server environment.Recommendations
Update to a version newer than 2.1.5.
Fix
Prototype Pollution
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Velocityjs