CVE Vulnerabilities

CVE-2025-64718

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

Published: Nov 13, 2025 | Modified: Nov 13, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

js-yaml is a JavaScript YAML parser and dumper. In js-yaml 4.1.0 and below, its possible for an attacker to modify the prototype of the result of a parsed yaml document via prototype pollution (__proto__). All users who parse untrusted yaml documents may be impacted. The problem is patched in js-yaml 4.1.1. Users can protect against this kind of attack on the server by using node --disable-proto=delete or deno (in Deno, pollution protection is on by default).

Weakness

The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.

Potential Mitigations

References