Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Prototype Pollution via the jsondiffpatch.patch() and jsondiffpatch/formatters/jsonpatch.patch() APIs. An attacker can perform prototype pollution by supplying crafted delta or JSON Patch documents, as attacker-controlled property names and path segments are used to traverse and modify objects without restricting access to special properties like __proto__ or constructor.prototype, allowing modification of Object.prototype.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 16 May 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Prototype Pollution via Unfiltered Delta or JSON Patch Input in jsondiffpatch |
Sat, 16 May 2026 05:30:00 +0000
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2026-05-16T05:00:09.867Z
Reserved: 2026-05-15T06:27:57.484Z
Link: CVE-2026-8657
No data.
Status : Received
Published: 2026-05-16T06:16:18.727
Modified: 2026-05-16T06:16:18.727
Link: CVE-2026-8657
No data.
OpenCVE Enrichment
Updated: 2026-05-16T07:00:11Z
Weaknesses