Intel

AIKIDO-2025-10884

graphql-upload-minimal is vulnerable to Prototype Pollution

Prototype Pollution Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

40

Medium Risk

This Affects:

JSgraphql-upload-minimal
0.1.0 - 1.6.3
Fixed in 1.6.4

TL;DR

Affected versions of this package are vulnerable to Prototype Pollution due to insufficient validation of user input when merging properties, specifically because the constructor property was not blocked alongside __proto__, allowing an attacker to inject properties into Object.prototype by crafting an object with a constructor property that points to an Object prototype, which can then be used to manipulate the prototype property of a newly created object and pollute the prototype chain, potentially leading to denial of service, bypassing security checks, or remote code execution.

Who does this affect?

You are affected if you are using a version which is within vulnerability ranges

Background info

graphql-upload-minimal is vulnerable to Prototype Pollution in versions 0.1.0 - 1.6.3.

How to fix this

Upgrade the graphql-upload-minimal library to the patch version.