In devalue v5.6.3, devalue.parse and devalue.unflatten were susceptible to prototype pollution via maliciously crafted payloads. Successful exploitation could lead to Denial of Service (DoS) or type confusion.
{
"severity": "MODERATE",
"github_reviewed": true,
"cwe_ids": [
"CWE-1321"
],
"github_reviewed_at": "2026-03-12T14:13:03Z",
"nvd_published_at": "2026-03-11T18:16:22Z"
}