| Title | 1024bit extend-deep 0.1.6 Prototype Pollution |
|---|
| Description | The extend-deep package recursively merges objects without proper sanitization of the __proto__ property. This allows attackers to pollute the global Object.prototype, affecting all objects in the application. When a malicious object with a __proto__ property is merged, it modifies the base prototype, injecting properties that propagate to every existing and future object.
|
|---|
| Source | ⚠️ https://github.com/sudo-secure/security-research/blob/main/extend-deep/prototype-pollution/PoC.md |
|---|
| User | sudosme (UID 96548) |
|---|
| Submission | 03/29/2026 14:29 (23 days ago) |
|---|
| Moderation | 04/19/2026 18:26 (21 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 358256 [1024bit extend-deep up to 0.1.6 index.js __proto__ prototype pollution] |
|---|
| Points | 20 |
|---|