Description
A string passed to devalue.parse could represent an object with a __proto__ property, which would assign a prototype to an object while allowing properties to be overwritten:
Recommendation
Update the devalue package to the latest compatible version. Followings are version details:
- Affected version(s): < 5.3.2
- Patched version(s): 5.3.2
References
Related Issues
- js-toml Prototype Pollution Vulnerability - CVE-2025-54803
- Lodash has Prototype Pollution Vulnerability in `_.unset` and `_.omit` functions (GHSA-xxjr-mmjv-4gpg) 3 - CVE-2025-13465
- Lodash has Prototype Pollution Vulnerability in `_.unset` and `_.omit` functions (GHSA-xxjr-mmjv-4gpg) - CVE-2025-13465
- Lodash has Prototype Pollution Vulnerability in `_.unset` and `_.omit` functions - CVE-2025-13465
- Tags:
- npm
- devalue
Anything's wrong? Let us know Last updated on August 27, 2025