CVE-2026-33228

flatted is a circular JSON parser. Prior to version 3.4.2, the parse() function in flatted can use attacker-controlled string values from the parsed JSON as direct array index keys, without validating that they are numeric. Since the internal input buffer is a JavaScript Array, accessing it with the key "__proto__" returns Array.prototype via the inherited getter. This object is then treated as a legitimate parsed value and assigned as a property of the output object, effectively leaking a live reference to Array.prototype to the consumer. Any code that subsequently writes to that property will pollute the global prototype. This issue has been patched in version 3.4.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:webreflection:flatted:*:*:*:*:*:node.js:*:*

History

No history.

Information

Published : 2026-03-20 23:16

Updated : 2026-03-23 19:14


NVD link : CVE-2026-33228

Mitre link : CVE-2026-33228

CVE.ORG link : CVE-2026-33228


JSON object : View

Products Affected

webreflection

  • flatted
CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')