Description
All versions of the package rangy are vulnerable to Prototype Pollution when using the extend()
function in file rangy-core.js
.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype.
Recommendation
No fix is available yet. Followings are affected versions:
- <= 1.3.1
References
Related Issues
- tarteaucitron Cross-site Scripting (XSS) - CVE-2025-1467
- Cross site scripting in markdown-to-jsx - CVE-2024-21535
- uPlot Prototype Pollution vulnerability - CVE-2024-21489
- FUXA local file inclusion vulnerability - CVE-2023-31718
- Tags:
- npm
- rangy
Anything's wrong? Let us know Last updated on March 03, 2023