Permalink
CVE-2025-64718
5.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): LOW
- Availability impact (A): NONE
js-yaml has prototype pollution in merge (<<)
js-yaml is a JavaScript YAML parser and dumper. In js-yaml 4.1.0 and below, it's possible for an attacker to modify the prototype of the result of a parsed yaml document via prototype pollution (`__proto__`). All users who parse untrusted yaml documents may be impacted. The problem is patched in js-yaml 4.1.1. Users can protect against this kind of attack on the server by using `node --disable-proto=delete` or `deno` (in Deno, pollution protection is on by default).
References
- https://github.com/nodeca/js-yaml/commit/383665ff4248ec2192d1274e934462bb30426879 x_refsource_MISC
- https://github.com/nodeca/js-yaml/security/advisories/GHSA-mh29-5h37-fv8m x_refsource_CONFIRM
- https://github.com/nodeca/js-yaml/security/advisories/GHSA-mh29-5h37-fv8m x_refsource_CONFIRM
- https://github.com/nodeca/js-yaml/commit/383665ff4248ec2192d1274e934462bb30426879 x_refsource_MISC
- https://github.com/advisories/GHSA-mh29-5h37-fv8m
- https://github.com/nodeca/js-yaml/commit/5278870a17454fe8621dbd8c445c412529525266 x_refsource_MISC
- https://github.com/nodeca/js-yaml/security/advisories/GHSA-mh29-5h37-fv8m x_refsource_CONFIRM
- https://github.com/nodeca/js-yaml/issues/730#issuecomment-3549635876 x_refsource_MISC
- https://github.com/nodeca/js-yaml/commit/383665ff4248ec2192d1274e934462bb30426879 x_refsource_MISC
- https://github.com/advisories/GHSA-mh29-5h37-fv8m
Affected products
js-yaml
- ==>= 4.0.0, < 4.1.1
- ==< 3.14.2
- ==< 4.1.1
Matching in nixpkgs
pkgs.nodePackages.js-yaml
YAML 1.2 parser and serializer
pkgs.nodePackages_latest.js-yaml
YAML 1.2 parser and serializer