Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-43p4-m455-4f4j | tRPC has possible prototype pollution in `experimental_nextAppDirCaller` |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 16 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 16 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trpc
Trpc trpc |
|
| Vendors & Products |
Trpc
Trpc trpc |
Tue, 16 Dec 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | tRPC allows users to build and consume fully typesafe APIs without schemas or code generation. Starting in version 10.27.0 and prior to versions 10.45.3 and 11.8.0, a A prototype pollution vulnerability exists in `@trpc/server`'s `formDataToObject` function, which is used by the Next.js App Router adapter. An attacker can pollute `Object.prototype` by submitting specially crafted FormData field names, potentially leading to authorization bypass, denial of service, or other security impacts. Note that this vulnerability is only present when using `experimental_caller` / `experimental_nextAppDirCaller`. Versions 10.45.3 and 11.8.0 fix the issue. | |
| Title | tRPC has possible prototype pollution in `experimental_nextAppDirCaller` | |
| Weaknesses | CWE-1321 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-16T21:38:37.366Z
Reserved: 2025-12-15T18:05:52.210Z
Link: CVE-2025-68130
Updated: 2025-12-16T21:38:34.471Z
Status : Received
Published: 2025-12-16T17:16:11.243
Modified: 2025-12-16T17:16:11.243
Link: CVE-2025-68130
No data.
OpenCVE Enrichment
Updated: 2025-12-16T20:45:07Z
Github GHSA