Description
Versions of extend
prior to 3.0.2 (for 3.x) and 2.0.2 (for 2.x) are vulnerable to Prototype Pollution. The extend()
function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects.
Recommendation
Update the extend
package to the latest compatible version. Followings are version details:
Affected version(s): **< 2.0.2 >= 3.0.0, < 3.0.2** Patched version(s): **2.0.2 3.0.2**
References
Related Issues
- jsPDF Denial of Service (DoS) - CVE-2025-57810
- MailDev Remote Code Execution - CVE-2024-27448
- vxe-table prototype pollution - CVE-2024-57080
- Cross-Site Scripting in jquery - CVE-2020-7656
- Tags:
- npm
- extend
Anything's wrong? Let us know Last updated on January 09, 2023