Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-1321 — Vulnerability Class 142

142 vulnerabilities classified as CWE-1321. AI Chinese analysis included.

CWE-1321 represents a critical vulnerability where applications fail to restrict modifications to an object’s prototype attributes, allowing attackers to inject malicious properties into the global prototype chain. This weakness is typically exploited by crafting specific input payloads that target JavaScript objects, enabling the injection of arbitrary keys such as constructor or prototype references. Successful exploitation can lead to severe consequences, including remote code execution, denial of service, or privilege escalation, as the injected properties affect all subsequent instances of the affected object. To mitigate this risk, developers must implement strict input validation, utilize libraries that freeze prototypes, or employ object creation methods that do not inherit from the global prototype, such as Object.create(null). Additionally, avoiding the use of unsafe recursive merge functions and sanitizing user-controlled data before processing are essential practices for preventing prototype pollution attacks in modern web applications.

MITRE CWE Description
The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.
Common Consequences (2)
Confidentiality, Integrity, AvailabilityRead Application Data, Modify Application Data
This weakness is usually exploited by using a special attribute of objects called proto, constructor, or prototype. Such attributes give access to the object prototype. An attacker can inject attributes that are used in other components by adding or modifying attributes of an object prototype. This …
AvailabilityDoS: Crash, Exit, or Restart
An attacker can override existing attributes with ones that have incompatible type, which may lead to a crash.
Mitigations (5)
ImplementationBy freezing the object prototype first (for example, Object.freeze(Object.prototype)), modification of the prototype becomes impossible.
Effectiveness: High
Architecture and DesignBy blocking modifications of attributes that resolve to object prototype, such as proto or prototype, this weakness can be mitigated.
Effectiveness: High
ImplementationWhen handling untrusted objects, validating using a schema can be used.
Effectiveness: Limited
ImplementationBy using an object without prototypes (via Object.create(null) ), adding object prototype attributes by accessing the prototype via the special attributes becomes impossible, mitigating this weakness.
Effectiveness: High
ImplementationMap can be used instead of objects in most cases. If Map methods are used instead of object attributes, it is not possible to access the object prototype or modify it.
Effectiveness: Moderate
Examples (1)
This function sets object attributes based on a dot-separated path.
function setValueByPath (object, path, value) { const pathArray = path.split("."); const attributeToSet = pathArray.pop(); let objectToModify = object; for (const attr of pathArray) { if (typeof objectToModify[attr] !== 'object') { objectToModify[attr] = {}; } objectToModify = objectToModify[attr]; } objectToModify[attributeToSet] = value; return object; }
Bad · JavaScript
setValueByPath({}, "__proto__.isAdmin", true) setValueByPath({}, "constructor.prototype.isAdmin", true)
Bad · JavaScript
CVE IDTitleCVSSSeverityPublished
CVE-2026-42264 Axios: Prototype pollution read-side gadgets in HTTP adapter allow credential injection and request hijacking — axios 7.4 High2026-05-08
CVE-2026-42232 n8n: XML Node Prototype Pollution to RCE — n8n 8.8AIHighAI2026-05-04
CVE-2026-42231 n8n: Prototype Pollution in XML Webhook Body Parser Leads to RCE — n8n 9.9AICriticalAI2026-05-04
CVE-2026-42077 Evolver: Prototype Pollution via `Object.assign()` in mailbox store operations — evolver 5.2 Medium2026-05-04
CVE-2026-42033 Axios: Prototype Pollution Gadgets - Response Tampering, Data Exfiltration, and Request Hijacking — axios 7.4 High2026-04-24
CVE-2026-6621 1024bit extend-deep index.js prototype pollution — extend-deep 7.3 High2026-04-20
CVE-2026-6594 brikcss merge prototype pollution — merge 7.3 High2026-04-20
CVE-2026-34622 Acrobat Reader | Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') (CWE-1321) — Acrobat Reader 8.6 High2026-04-14
CVE-2026-34626 Acrobat Reader | Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') (CWE-1321) — Acrobat Reader 6.3 Medium2026-04-14
CVE-2026-34621 Acrobat Reader | Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') (CWE-1321) — Acrobat Reader 8.6 High2026-04-11
CVE-2026-40190 LangSmith Client SDKs has Prototype Pollution in langsmith-sdk via Incomplete `__proto__` Guard in Internal lodash `set()` — langsmith-sdk 5.6 Medium2026-04-10
CVE-2026-35209 defu: Prototype pollution via `__proto__` key in defaults argument — defu 7.5 High2026-04-06
CVE-2026-2950 lodash vulnerable to Prototype Pollution via array path bypass in `_.unset` and `_.omit` — lodash 6.5 Medium2026-03-31
CVE-2026-34221 MikroORM has Prototype Pollution in Utils.merge — mikro-orm 8.2AIHighAI2026-03-31
CVE-2026-33994 Locutus Prototype Pollution due to incomplete fix for CVE-2026-25521 — locutus 9.8 -2026-03-27
CVE-2026-33993 Locutus has Prototype Pollution via __proto__ Key Injection in unserialize() — locutus 9.8 -2026-03-27
CVE-2026-33672 Picomatch: Method Injection in POSIX Character Classes causes incorrect Glob Matching — picomatch 5.3 Medium2026-03-26
CVE-2026-33696 n8n Vulnerable to Prototype Pollution in XML & GSuiteAdmin node parameters lead to RCE — n8n 8.8 -2026-03-25
CVE-2026-33228 flatted: Prototype Pollution via parse() — flatted 9.1 -2026-03-20
CVE-2026-32886 Parse Server's Cloud function dispatch crashes server via prototype chain traversal — parse-server 7.5 -2026-03-18
CVE-2026-32878 Parse Server vulnerable to schema poisoning via prototype pollution in deep copy — parse-server 8.2 -2026-03-18
CVE-2026-31865 Elysia Cookie Value Prototype Pollution — elysia 6.5 Medium2026-03-18
CVE-2026-27524 OpenClaw < 2026.2.21 - Prototype Pollution via Debug Override Path — OpenClaw 4.3 Medium2026-03-18
CVE-2026-4239 Lagom WHMCS Template Datatables prototype pollution — WHMCS Template 3.5 Low2026-03-16
CVE-2026-32621 Apollo Federation has prototype pollution via incomplete key sanitization — federation-internals 9.9 Critical2026-03-13
CVE-2026-30226 devalue has prototype pollution in devalue.parse and devalue.unflatten — devalue 9.1AICriticalAI2026-03-11
CVE-2026-30939 Parse Server has Denial of Service (DoS) and Cloud Function Dispatch Bypass via Prototype Chain Resolution — parse-server 7.5AIHighAI2026-03-10
CVE-2026-29063 Immutable.js: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in immutable — immutable-js 9.8 -2026-03-06
CVE-2026-28794 oRPC: Prototype Pollution in `@orpc/client` via `StandardRPCJsonSerializer` Deserialization — orpc 9.8 -2026-03-06
CVE-2026-27837 Dottie vulnerable to prototype pollution bypass via non-first path segments in set() and transform() — dottie.js 6.3 Medium2026-02-26

Vulnerabilities classified as CWE-1321 represent 142 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.