seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0 and below, due to improper input validation, a malicious object key can lead to prototype pollution during JSON deserialization. This vulnerability affects only JSON deserialization functionality. This issue is fixed in version 1.4.1.
References
Configurations
History
27 Feb 2026, 19:36
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/lxsmnsyc/seroval/commit/ce9408ebc87312fcad345a73c172212f2a798060 - Patch | |
| References | () https://github.com/lxsmnsyc/seroval/security/advisories/GHSA-hj76-42vx-jwp4 - Vendor Advisory | |
| CPE | cpe:2.3:a:lxsmnsyc:seroval:*:*:*:*:*:node.js:*:* | |
| First Time |
Lxsmnsyc seroval
Lxsmnsyc |
21 Jan 2026, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-21 23:15
Updated : 2026-02-27 19:36
NVD link : CVE-2026-23736
Mitre link : CVE-2026-23736
CVE.ORG link : CVE-2026-23736
JSON object : View
Products Affected
lxsmnsyc
- seroval
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
