Dottie provides nested object access and manipulation in JavaScript. Versions 2.0.4 through 2.0.6 contain an incomplete fix for CVE-2023-26132. The prototype pollution guard introduced in commit `7d3aee1` only validates the first segment of a dot-separated path, allowing an attacker to bypass the protection by placing `__proto__` at any position other than the first. Both `dottie.set()` and `dottie.transform()` are affected. Version 2.0.7 contains an updated fix to address the residual vulnerability.
References
| Link | Resource |
|---|---|
| https://github.com/advisories/GHSA-4gxf-g5gf-22h4 | Not Applicable |
| https://github.com/mickhansen/dottie.js/commit/7e8fa1345a4b46325f0eab8d7aeb1c4deaefdb14 | Patch |
| https://github.com/mickhansen/dottie.js/security/advisories/GHSA-r5mx-6wc6-7h9w | Exploit Vendor Advisory |
| https://github.com/mickhansen/dottie.js/security/advisories/GHSA-r5mx-6wc6-7h9w | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-26 01:16
Updated : 2026-02-28 00:58
NVD link : CVE-2026-27837
Mitre link : CVE-2026-27837
CVE.ORG link : CVE-2026-27837
JSON object : View
Products Affected
dottie_project
- dottie
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
