slate is vulnerable to Prototype Pollution
30
Low Risk
Affected versions of this package may allow unsafe JavaScript property access using attacker-controlled keys, enabling prototype pollution or unexpected object behavior when untrusted input is used in square-bracket accessors or serialized path operations. An attacker might exploit this by supplying crafted keys such as __proto__, or hasOwnProperty to overwrite inherited Object prototype properties, causing application logic corruption, denial of service, or unsafe behavior in downstream code that relies on trusted object semantics.
You are affected if you are using a version that falls within the vulnerable range.
slate is vulnerable to Prototype Pollution in versions 0.111.0 - 0.124.0.
Upgrade the slate library to the patch version.
Connect your repositories to instantly see whether vulnerable or malicious packages exist in your codebase.
Free. No credit card required.

SOC 2Compliant
ISO 27001Compliant