Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-915 — Vulnerability Class 54

54 vulnerabilities classified as CWE-915. AI Chinese analysis included.

CWE-915 represents a critical input validation weakness where software fails to restrict which object attributes can be modified based on external input. Attackers typically exploit this by injecting malicious data that targets internal or privileged properties, such as access control flags or system configuration settings, rather than intended user-facing fields. This unauthorized modification can bypass security mechanisms, escalate privileges, or cause denial of service by corrupting the object’s internal state. To prevent this vulnerability, developers must implement strict allow-lists that explicitly define permissible attributes for modification, ensuring that only expected fields are updated. Additionally, employing robust serialization frameworks with built-in validation and conducting thorough code reviews to identify dynamic attribute assignment patterns are essential strategies for mitigating this risk and maintaining application integrity.

MITRE CWE Description
The product receives input from an upstream component that specifies multiple attributes, properties, or fields that are to be initialized or updated in an object, but it does not properly control which attributes can be modified. If the object contains attributes that were only intended for internal use, then their unexpected modification could lead to a vulnerability. This weakness is sometimes known by the language-specific mechanisms that make it possible, such as mass assignment, autobinding, or object injection.
Common Consequences (3)
IntegrityModify Application Data
An attacker could modify sensitive data or program variables.
IntegrityExecute Unauthorized Code or Commands
Other, IntegrityVaries by Context, Alter Execution Logic
Mitigations (4)
ImplementationIf available, use features of the language or framework that allow specification of allowlists of attributes or fields that are allowed to be modified. If possible, prefer allowlists over denylists. For applications written with Ruby on Rails, use the attr_accessible (allowlist) or attr_protected (denylist) macros in each class that may be used in mass assignment.
Architecture and Design, ImplementationIf available, use the signing/sealing features of the programming language to assure that deserialized data has not been tainted. For example, a hash-based message authentication code (HMAC) could be used to ensure that data has not been modified.
ImplementationFor any externally-influenced input, check the input against an allowlist of internal object attributes or fields that are allowed to be modified.
Implementation, Architecture and DesignRefactor the code so that object attributes or fields do not need to be dynamically identified, and only expose getter/setter functionality for the intended attributes.
Examples (1)
This function sets object attributes based on a dot-separated path.
function setValueByPath (object, path, value) { const pathArray = path.split("."); const attributeToSet = pathArray.pop(); let objectToModify = object; for (const attr of pathArray) { if (typeof objectToModify[attr] !== 'object') { objectToModify[attr] = {}; } objectToModify = objectToModify[attr]; } objectToModify[attributeToSet] = value; return object; }
Bad · JavaScript
setValueByPath({}, "__proto__.isAdmin", true) setValueByPath({}, "constructor.prototype.isAdmin", true)
Bad · JavaScript
CVE IDTitleCVSSSeverityPublished
CVE-2025-49597 handcraftedinthealps goodby-csv Potential Gadget Chain allowing Remote Code Execution — goodby-csv 3.9 Low2025-06-13
CVE-2025-31674 Drupal core - Moderately critical - Gadget Chain - SA-CORE-2025-003 — Drupal core 9.8 -2025-03-31
CVE-2025-30358 Mesop Class Pollution vulnerability leads to DoS and Jailbreak attacks — mesop 8.1 High2025-03-27
CVE-2024-10359 Mass Assignment in Preset Creation Allows User ID Manipulation in danny-avila/librechat — danny-avila/librechat 5.4 -2025-03-20
CVE-2025-2304 Camaleon CMS Privilege Escalation — camaleon-cms 8.8 -2025-03-14
CVE-2025-24370 Django-Unicorn Class Pollution Vulnerability, Leading to XSS, DoS and Authentication Bypass — django-unicorn 9.1 -2025-02-03
CVE-2024-55638 Drupal core - Moderately critical - Gadget chain - SA-CORE-2024-008 — Drupal Core 9.8 -2024-12-09
CVE-2024-55637 Drupal core - Moderately critical - Gadget chain - SA-CORE-2024-007 — Drupal Core 9.8 -2024-12-09
CVE-2024-55636 Drupal core - Less critical - Gadget chain - SA-CORE-2024-006 — Drupal Core 9.8 -2024-12-09
CVE-2024-5452 RCE via Property/Class Pollution in lightning-ai/pytorch-lightning — lightning-ai/pytorch-lightning 8.8AIHighAI2024-06-06
CVE-2024-0404 Mass Assignment Vulnerability in mintplex-labs/anything-llm — mintplex-labs/anything-llm 9.8 -2024-04-16
CVE-2024-3283 Privilege Escalation via Mass Assignment in mintplex-labs/anything-llm — mintplex-labs/anything-llm 7.2AIHighAI2024-04-10
CVE-2023-39983 MXsecurity Register Database Pollution — MXsecurity Series 5.3 Medium2023-09-02
CVE-2023-32079 Netmaker Privilige Escalation Vulnerability — netmaker 8.8 High2023-08-24
CVE-2022-43441 node-sqlite3 安全漏洞 — node-sqlite3 8.1 High2023-03-16
CVE-2022-4068 Improperly Controlled Modification of Dynamically-Determined Object Attributes in librenms/librenms — librenms/librenms 8.2 -2022-11-20
CVE-2022-2625 PostgreSQL 安全漏洞 — postgresql 7.1 -2022-08-18
CVE-2022-31106 Prototype Pollution in underscore.deep — underscore.deep 8.3 High2022-06-28
CVE-2022-24802 Prototype Pollution in deepmerge-ts — deepmerge-ts 8.1 High2022-03-31
CVE-2021-32811 Remote Code Execution via Script (Python) objects under Python 3 — Zope 7.5 High2021-08-02
CVE-2021-32807 Remote Code Execution via unsafe classes in otherwise permitted modules — AccessControl 4.4 Medium2021-07-30
CVE-2021-21368 Prototype poisoning — msgpack5 6.7 Medium2021-03-12
CVE-2021-21304 Prototype Pollution in Dynamoose — dynamoose 7.2 High2021-02-08
CVE-2020-11066 Improperly Controlled Modification of Dynamically-Determined Object Attributes in TYPO3 CMS — TYPO3 CMS 8.7 High2020-05-13

Vulnerabilities classified as CWE-915 represent 54 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.