Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hxj9-33pp-j2cc | Elysia vulnerable to prototype pollution with multiple standalone schema validation |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 10 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elysiajs
Elysiajs elysia |
|
| Vendors & Products |
Elysiajs
Elysiajs elysia |
Tue, 09 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Elysia is a Typescript framework for request validation, type inference, OpenAPI documentation and client-server communication. Versions 1.4.0 through 1.4.16 contain a prototype pollution vulnerability in `mergeDeep` after merging results of two standard schema validations with the same key. Due to the ordering of merging, there must be an any type that is set as a standalone guard, to allow for the `__proto__ prop` to be merged. When combined with GHSA-8vch-m3f4-q8jf this allows for a full RCE by an attacker. This issue is fixed in version 1.4.17. To workaround, remove the `__proto__ key` from body. | |
| Title | Elysia vulnerable to prototype pollution with multiple standalone schema validation | |
| Weaknesses | CWE-1321 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-09T20:35:44.683Z
Reserved: 2025-12-01T22:51:54.580Z
Link: CVE-2025-66456
Updated: 2025-12-09T20:11:40.823Z
Status : Received
Published: 2025-12-09T20:15:54.760
Modified: 2025-12-09T21:16:00.030
Link: CVE-2025-66456
No data.
OpenCVE Enrichment
Updated: 2025-12-10T21:33:24Z
Github GHSA