xml2js version 0.4.23 allows an external attacker to edit or add new properties to an object. This is possible because the application does not properly validate incoming JSON keys, thus allowing the __proto__ property to be edited.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3760-1 | node-xml2js security update |
EUVD |
EUVD-2023-1222 | xml2js version 0.4.23 allows an external attacker to edit or add new properties to an object. This is possible because the application does not properly validate incoming JSON keys, thus allowing the __proto__ property to be edited. |
Github GHSA |
GHSA-776f-qx25-q3cc | xml2js is vulnerable to prototype pollution |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 24 Sep 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 13 Feb 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2025-09-24T11:46:07.112Z
Reserved: 2023-02-15T00:00:00.000Z
Link: CVE-2023-0842
Updated: 2024-08-02T05:24:34.583Z
Status : Modified
Published: 2023-04-05T20:15:07.493
Modified: 2025-09-24T12:15:28.800
Link: CVE-2023-0842
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA