oRPC is an tool that helps build APIs that are end-to-end type-safe and adhere to OpenAPI standards. Prior to version 1.13.6, a prototype pollution vulnerability exists in the RPC JSON deserializer of the @orpc/client package. The vulnerability allows unauthenticated, remote attackers to inject arbitrary properties into the global Object.prototype. Because this pollution persists for the lifetime of the Node.js process and affects all objects, it can lead to severe security breaches, including authentication bypass, denial of service, and potentially Remote Code Execution. This issue has been patched in version 1.13.6.
References
| Link | Resource |
|---|---|
| https://github.com/middleapi/orpc/commit/1dba06fc6f938c2486de303c2fa096bc1c8418b5 | Patch |
| https://github.com/middleapi/orpc/security/advisories/GHSA-m272-9rp6-32mc | Exploit Vendor Advisory |
Configurations
History
10 Mar 2026, 19:48
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/middleapi/orpc/commit/1dba06fc6f938c2486de303c2fa096bc1c8418b5 - Patch | |
| References | () https://github.com/middleapi/orpc/security/advisories/GHSA-m272-9rp6-32mc - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:orpc:orpc:*:*:*:*:*:*:*:* | |
| First Time |
Orpc
Orpc orpc |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
09 Mar 2026, 13:36
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
06 Mar 2026, 05:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-06 05:16
Updated : 2026-03-10 19:48
NVD link : CVE-2026-28794
Mitre link : CVE-2026-28794
CVE.ORG link : CVE-2026-28794
JSON object : View
Products Affected
orpc
- orpc
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
