PT-2026-41422 · Npm · Jsondiffpatch
Yuki Matsuhashi
·
Published
2026-05-16
·
Updated
2026-05-16
·
CVE-2026-8657
CVSS v3.1
8.2
High
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L |
Name of the Vulnerable Software and Affected Versions
jsondiffpatch versions prior to 0.7.6
Description
Prototype Pollution occurs when attacker-controlled property names and path segments are used to traverse and modify objects without restricting access to special properties like
proto or constructor.prototype, allowing modification of Object.prototype. This can be triggered by supplying crafted delta or JSON Patch documents through the 'jsondiffpatch.patch()' and 'jsondiffpatch/formatters/jsonpatch.patch()' APIs.Recommendations
Update to version 0.7.6 or later.
Fix
Prototype Pollution
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Jsondiffpatch