Project Subscriptions
No data.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-75px-5xx7-5xc7 | protobuf.js: Code generation gadget after prototype pollution |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 13 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs used plain objects with inherited prototypes for internal type lookup tables used by generated encode and decode functions. If Object.prototype had already been polluted, those lookup tables could resolve attacker-controlled inherited properties as valid protobuf type information. This could cause attacker-controlled strings to be emitted into generated JavaScript code. This vulnerability is fixed in 7.5.6 and 8.0.2. | |
| Title | protobufjs: Code generation gadget after prototype pollution | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T15:32:06.425Z
Reserved: 2026-05-05T17:39:31.112Z
Link: CVE-2026-44291
Updated: 2026-05-13T15:32:01.630Z
Status : Awaiting Analysis
Published: 2026-05-13T16:16:55.987
Modified: 2026-05-13T17:01:38.423
Link: CVE-2026-44291
No data.
OpenCVE Enrichment
Updated: 2026-05-13T17:45:25Z
Github GHSA