CVE-2026-25047
Prototype Pollution in deephas 1.0.7 Allows Global Object Modification
Publication date: 2026-01-29
Last updated on: 2026-02-25
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sharpred | deephas | 1.0.7 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1321 | The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a prototype pollution issue in version 1.0.7 of the deephas npm package. It allows an attacker to modify the global object behavior by exploiting the deepHas function, which tests for the existence of a nested object key and optionally returns that key. This can lead to unexpected behavior in applications using this package. The issue was fixed in version 1.0.8.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to alter the global object behavior in applications using the affected deephas package version. This can lead to severe security issues such as unauthorized code execution, data manipulation, or application instability, potentially compromising the integrity and security of the affected system.
What immediate steps should I take to mitigate this vulnerability?
Upgrade the deephas npm package to version 1.0.8 or later, as this version contains the fix for the prototype pollution vulnerability present in version 1.0.7.