Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Prototype Pollution via the jsondiffpatch.patch() and jsondiffpatch/formatters/jsonpatch.patch() APIs. An attacker can perform prototype pollution by supplying crafted delta or JSON Patch documents, as attacker-controlled property names and path segments are used to traverse and modify objects without restricting access to special properties like __proto__ or constructor.prototype, allowing modification of Object.prototype.
Metrics
Affected Vendors & Products
References
History
Sat, 16 May 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Prototype Pollution via Unfiltered Delta or JSON Patch Input in jsondiffpatch |
Sat, 16 May 2026 05:30:00 +0000
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2026-05-16T05:00:09.867Z
Reserved: 2026-05-15T06:27:57.484Z
Link: CVE-2026-8657
No data.
Status : Received
Published: 2026-05-16T06:16:18.727
Modified: 2026-05-16T06:16:18.727
Link: CVE-2026-8657
No data.