In js-yaml 4.1.0, 4.0.0, and 3.14.1 and below, it's possible for an attacker to modify the prototype of the result of a parsed yaml document via prototype pollution (__proto__). All users who parse untrusted yaml documents may be impacted.
Problem is patched in js-yaml 4.1.1 and 3.14.2.
You can protect against this kind of attack on the server by using node --disable-proto=delete or deno (in Deno, pollution protection is on by default).
https://cheatsheetseries.owasp.org/cheatsheets/PrototypePollutionPreventionCheatSheet.html
{
"severity": "MODERATE",
"github_reviewed": true,
"cwe_ids": [
"CWE-1321"
],
"nvd_published_at": "2025-11-13T16:15:57Z",
"github_reviewed_at": "2025-11-14T14:29:48Z"
}