expand-object Vulnerable to Prototype Pollution via the expand() Function
Moderate severity
GitHub Reviewed
Published
Apr 4, 2025
to the GitHub Advisory Database
•
Updated Apr 4, 2025
Description
Published by the National Vulnerability Database
Apr 4, 2025
Published to the GitHub Advisory Database
Apr 4, 2025
Reviewed
Apr 4, 2025
Last updated
Apr 4, 2025
Versions of the package expand-object from 0.0.0 to 0.4.2 are vulnerable to Prototype Pollution in the expand() function in index.js. This function expands the given string into an object and allows a nested property to be set without checking the provided keys for sensitive properties like proto.
References