graphql-upload-minimal is vulnerable to Prototype Pollution
40
Medium Risk
Affected versions of this package are vulnerable to Prototype Pollution due to insufficient validation of user input when merging properties, specifically because the constructor property was not blocked alongside __proto__, allowing an attacker to inject properties into Object.prototype by crafting an object with a constructor property that points to an Object prototype, which can then be used to manipulate the prototype property of a newly created object and pollute the prototype chain, potentially leading to denial of service, bypassing security checks, or remote code execution.
You are affected if you are using a version which is within vulnerability ranges
graphql-upload-minimal is vulnerable to Prototype Pollution in versions 0.1.0 - 1.6.3.
Upgrade the graphql-upload-minimal library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant