Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. In devalue v5.6.3 and earlier, devalue.parse and devalue.unflatten were susceptible to prototype pollution via maliciously crafted payloads. Successful exploitation could lead to Denial of Service (DoS) or type confusion. This vulnerability is fixed in 5.6.4.
References
| Link | Resource |
|---|---|
| https://github.com/sveltejs/devalue/security/advisories/GHSA-cfw5-2vxh-hr84 | Vendor Advisory |
Configurations
History
17 Mar 2026, 19:07
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CPE | cpe:2.3:a:svelte:devalue:*:*:*:*:*:node.js:*:* | |
| First Time |
Svelte
Svelte devalue |
|
| References | () https://github.com/sveltejs/devalue/security/advisories/GHSA-cfw5-2vxh-hr84 - Vendor Advisory | |
| Summary |
|
11 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-11 18:16
Updated : 2026-03-17 19:07
NVD link : CVE-2026-30226
Mitre link : CVE-2026-30226
CVE.ORG link : CVE-2026-30226
JSON object : View
Products Affected
svelte
- devalue
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
