Description
A vulnerability was determined in 1024bit extend-deep up to 0.1.6. The impacted element is an unknown function of the file index.js. This manipulation of the argument __proto__ causes improperly controlled modification of object prototype attributes. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The code repository of the project has not been active for many years.
Published: 2026-04-20
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Prototype Pollution enabling potential Remote Code Execution
Action: Patch
AI Analysis

Impact

A flaw in the index.js file of the 1024bit extend-deep library allows an attacker to manipulate the __proto__ property of objects. This leads to prototype pollution, where malicious values can overwrite properties on JavaScript prototypes. The result can be arbitrary code execution or other damaging changes to application state. The vulnerability is classified as CWE‑1321 and involves unsafe execution paths associated with CWE‑94. The exact source of malicious payload is not disclosed, but it is inferred that an attacker could trigger the flaw remotely by sending crafted input to the vulnerable function.

Affected Systems

The library 1024bit extend‑deep is affected, with all releases up to and including version 0.1.6. Any application that imports or uses this module without upgrading is potentially vulnerable.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate to high severity. No EPSS data is available, and the vulnerability is not listed in CISA’s KEV catalog. Publicly disclosed exploits exist, and remote exploitation is possible when untrusted data flows into the vulnerable function. Attackers can likely trigger the flaw through network‑based inputs or by including malicious payloads when the library is executed in a web environment. The likely attack vector is remote via network inputs or included malicious payloads, which is inferred rather than directly stated.

Generated by OpenCVE AI on April 20, 2026 at 09:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the extend‑deep package to the latest version that removes the prototype‑pollution flaw.
  • If upgrading is not immediately possible, monitor incoming arguments and sanitize any __proto__ properties before passing them to the library.
  • Consider replacing or removing the extend‑deep dependency, especially if it handles untrusted input.

Generated by OpenCVE AI on April 20, 2026 at 09:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared 1024bit
1024bit extend-deep
Vendors & Products 1024bit
1024bit extend-deep

Mon, 20 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in 1024bit extend-deep up to 0.1.6. The impacted element is an unknown function of the file index.js. This manipulation of the argument __proto__ causes improperly controlled modification of object prototype attributes. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The code repository of the project has not been active for many years.
Title 1024bit extend-deep index.js prototype pollution
Weaknesses CWE-1321
CWE-94
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

1024bit Extend-deep
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-20T15:33:04.684Z

Reserved: 2026-04-19T16:26:25.296Z

Link: CVE-2026-6621

cve-icon Vulnrichment

Updated: 2026-04-20T15:32:54.251Z

cve-icon NVD

Status : Received

Published: 2026-04-20T09:16:10.170

Modified: 2026-04-20T09:16:10.170

Link: CVE-2026-6621

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T14:57:59Z

Weaknesses