Description
JavaScript is vulnerable to prototype pollution in Mafintosh's protocol-buffers-schema Version 3.6.0, where an attacker may alter the application logic, bypass security checks, cause a DoS or achieve remote code execution.
Published: 2026-04-15
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via prototype pollution
Action: Immediate Patch
AI Analysis

Impact

An attacker can use JavaScript prototype pollution in the Mafintosh protocol-buffers-schema library version 3.6.0 to modify properties on Object.prototype, as identified in the vulnerability entry. Such manipulation can alter application behavior, undermine authentication or authorization checks, trigger denial‑of‑service states, or in some contexts enable the execution of arbitrary code by the vulnerable host. The impact therefore includes potential code execution in addition to integrity compromise depending on how the parsed data is used in the target application.

Affected Systems

The affected product is Mafintosh’s protocol‑buffers‑schema parser, specifically version 3.6.0. Any Node.js application that imports or depends on this version of the package is at risk. The vulnerability is tied solely to this single version; newer releases include fixes.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate severity. An EPSS score of less than 1% indicates a very low but non‑zero probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog, so the current exploitation probability remains low. The vulnerability is typically exploitable remotely: an attacker can supply a crafted protocol buffer message to the vulnerable parser, thereby influencing the prototype chain before other application logic processes the data. Because prototype pollution can alter fundamental language behavior, the potential impact can be significant if the corrupted objects are later used for privileged operations.

Generated by OpenCVE AI on April 17, 2026 at 09:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the protocol‑buffers‑schema package to the latest available release (post‑3.6.0) or apply the patch contained in version 3.6.1 or newer.
  • If an immediate upgrade is not possible, hard‑enforce input validation by restricting the parser to trusted, whitelisted protocol buffer definitions and ensuring that no untrusted data reaches the vulnerable code.
  • Lock the dependency in package-lock.json or use npm‑audit to block the installation of the vulnerable 3.6.0 version and audit existing installations for the presence of that release.

Generated by OpenCVE AI on April 17, 2026 at 09:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-j452-xhg8-qg39 Mafintosh's protocol-buffers-schema is vulnerable to prototype pollution
History

Fri, 17 Apr 2026 08:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1135

Fri, 17 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-915
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 16 Apr 2026 09:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1135

Wed, 15 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1174

Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Mafintosh
Mafintosh protocol-buffers-schema Parser
Vendors & Products Mafintosh
Mafintosh protocol-buffers-schema Parser

Wed, 15 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1174

Wed, 15 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description JavaScript is vulnerable to prototype pollution in Mafintosh's protocol-buffers-schema Version 3.6.0, where an attacker may alter the application logic, bypass security checks, cause a DoS or achieve remote code execution.
Title Mafintosh's protocol-buffers-schema is vulnerable to prototype pollution
References

Subscriptions

Mafintosh Protocol-buffers-schema Parser
cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2026-04-15T18:55:45.526Z

Reserved: 2026-04-07T17:20:03.756Z

Link: CVE-2026-5758

cve-icon Vulnrichment

Updated: 2026-04-15T18:55:39.046Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-15T18:17:24.920

Modified: 2026-04-17T15:17:00.957

Link: CVE-2026-5758

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-15T17:20:13Z

Links: CVE-2026-5758 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T09:30:14Z

Weaknesses