Description
Prototype pollution vulnerability via .parse()
in Plist allows attackers to cause a Denial of Service (DoS) and may lead to remote code execution.
Recommendation
Update the plist
package to the latest compatible version. Followings are version details:
- Affected version(s): < 3.0.5
- Patched version(s): 3.0.5
References
Related Issues
- CodeceptJS's incomprehensive sanitation can lead to Command Injection - CVE-2025-57285
- Payload does not invalidate JWTs after log out (GHSA-5v66-m237-hwf7) 2 - CVE-2025-4643
- The AuthKit React Router Library rendered sensitive auth data in HTML - CVE-2025-55008
- Vite allows server.fs.deny to be bypassed with .svg or relative paths - CVE-2025-31486
- Tags:
- npm
- plist
Anything's wrong? Let us know Last updated on November 29, 2023