Description
A vulnerability was found in docarray up to 0.40.1. It has been rated as critical. Affected by this issue is the function __getitem__ of the file /docarray/data/torch_dataset.py of the component Web API. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2025-05-25
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-16241 docarray prototype pollution
Github GHSA Github GHSA GHSA-j9wp-865g-rf48 docarray prototype pollution
History

Tue, 03 Jun 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Linuxfoundation
Linuxfoundation docarray
CPEs cpe:2.3:a:linuxfoundation:docarray:*:*:*:*:*:*:*:*
Vendors & Products Linuxfoundation
Linuxfoundation docarray

Wed, 28 May 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 25 May 2025 15:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in docarray up to 0.40.1. It has been rated as critical. Affected by this issue is the function __getitem__ of the file /docarray/data/torch_dataset.py of the component Web API. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title docarray Web API torch_dataset.py __getitem__ prototype pollution
Weaknesses CWE-1321
CWE-94
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Linuxfoundation Docarray
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-05-28T17:38:30.293Z

Reserved: 2025-05-24T17:35:59.271Z

Link: CVE-2025-5150

cve-icon Vulnrichment

Updated: 2025-05-27T14:21:29.121Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-25T15:15:22.667

Modified: 2025-06-03T12:58:43.070

Link: CVE-2025-5150

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses