JavaScript is vulnerable to prototype pollution in Mafintosh's protocol-buffers-schema Version 3.6.0, where an attacker may alter the application logic, bypass security checks, cause a DoS or achieve remote code execution.
History

Wed, 15 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1174

Wed, 15 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description JavaScript is vulnerable to prototype pollution in Mafintosh's protocol-buffers-schema Version 3.6.0, where an attacker may alter the application logic, bypass security checks, cause a DoS or achieve remote code execution.
Title Mafintosh's protocol-buffers-schema is vulnerable to prototype pollution
References

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2026-04-15T18:55:45.526Z

Reserved: 2026-04-07T17:20:03.756Z

Link: CVE-2026-5758

cve-icon Vulnrichment

Updated: 2026-04-15T18:55:39.046Z

cve-icon NVD

Status : Received

Published: 2026-04-15T18:17:24.920

Modified: 2026-04-15T18:17:24.920

Link: CVE-2026-5758

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T19:30:12Z