CVE-2026-27837

Source
https://cve.org/CVERecord?id=CVE-2026-27837
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27837.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-27837
Aliases
Downstream
Related
Published
2026-02-26T00:19:24.289Z
Modified
2026-03-03T02:56:44.411551Z
Severity
  • 6.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L CVSS Calculator
Summary
Dottie vulnerable to prototype pollution bypass via non-first path segments in set() and transform()
Details

Dottie provides nested object access and manipulation in JavaScript. Versions 2.0.4 through 2.0.6 contain an incomplete fix for CVE-2023-26132. The prototype pollution guard introduced in commit 7d3aee1 only validates the first segment of a dot-separated path, allowing an attacker to bypass the protection by placing __proto__ at any position other than the first. Both dottie.set() and dottie.transform() are affected. Version 2.0.7 contains an updated fix to address the residual vulnerability.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27837.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-1321"
    ]
}
References

Affected packages

Git / github.com/mickhansen/dottie.js

Affected ranges

Type
GIT
Repo
https://github.com/mickhansen/dottie.js
Events

Affected versions

v2.*
v2.0.4
v2.0.6

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27837.json"