Vulnerabilities/

devalue `uneval`ed code can create objects with polluted prototypes when `eval`ed

Severity:
Low

Description

Under certain circumstances, unevaling untrusted data can produce output code that will create objects with polluted prototypes when later evaled, meaning the output data can be a different shape from the input data.

Recommendation

Update the devalue package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
devalue
Anything's wrong? Let us know Last updated on February 19, 2026