CVE Vulnerabilities

CVE-2023-26102

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

Published: Feb 24, 2023 | Modified: Mar 11, 2025
CVSS 3.x
8.2
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

All versions of the package rangy are vulnerable to Prototype Pollution when using the extend() function in file rangy-core.js.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype

Weakness

The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.

Affected Software

Name Vendor Start Version End Version
Rangy Rangy_project - (including) - (including)

Potential Mitigations

References