CVE-2025-3193
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-27

Last updated on: 2025-10-05

Assigner: Snyk

Description
Versions of the package algoliasearch-helper from 2.0.0-rc1 and before 3.11.2 are vulnerable to Prototype Pollution in the _merge() function in merge.js, which allows constructor.prototype to be written even though doing so throws an error. In the "extreme edge-case" that the resulting error is caught, code injected into the user-supplied search parameter may be exeucted. This is related to but distinct from the issue reported in [CVE-2021-23433](https://security.snyk.io/vuln/SNYK-JS-ALGOLIASEARCHHELPER-1570421). **NOTE:** This vulnerability is not exploitable in the default configuration of InstantSearch since searchParameters are not modifiable by users.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-27
Last Modified
2025-10-05
Generated
2026-05-07
AI Q&A
2025-09-27
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
algolia algoliasearch-helper From 2.0.0 (inc) to 3.11.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1321 The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Prototype Pollution issue in the _merge() function of the algoliasearch-helper package (versions 2.0.0-rc1 to before 3.11.2). It allows the constructor.prototype to be written to, which normally throws an error. In a rare edge case where this error is caught, malicious code injected via the user-supplied search parameter could be executed. However, this vulnerability is not exploitable in the default configuration of InstantSearch because searchParameters cannot be modified by users.


How can this vulnerability impact me? :

If exploited, this vulnerability could allow execution of malicious code through user-supplied search parameters, potentially leading to denial of service or other impacts on availability. However, exploitation requires an unusual edge case and is not possible in default InstantSearch configurations.


What immediate steps should I take to mitigate this vulnerability?

Upgrade the algoliasearch-helper package to a version later than 3.11.2, as versions 2.0.0-rc1 and before 3.11.2 are vulnerable. Additionally, ensure that user-supplied searchParameters are not modifiable, as the vulnerability is not exploitable in the default configuration of InstantSearch where searchParameters cannot be modified by users.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart