Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-43p4-m455-4f4j | tRPC has possible prototype pollution in `experimental_nextAppDirCaller` |
Tue, 16 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 16 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trpc
Trpc trpc |
|
| Vendors & Products |
Trpc
Trpc trpc |
Tue, 16 Dec 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | tRPC allows users to build and consume fully typesafe APIs without schemas or code generation. Starting in version 10.27.0 and prior to versions 10.45.3 and 11.8.0, a A prototype pollution vulnerability exists in `@trpc/server`'s `formDataToObject` function, which is used by the Next.js App Router adapter. An attacker can pollute `Object.prototype` by submitting specially crafted FormData field names, potentially leading to authorization bypass, denial of service, or other security impacts. Note that this vulnerability is only present when using `experimental_caller` / `experimental_nextAppDirCaller`. Versions 10.45.3 and 11.8.0 fix the issue. | |
| Title | tRPC has possible prototype pollution in `experimental_nextAppDirCaller` | |
| Weaknesses | CWE-1321 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-16T21:38:37.366Z
Reserved: 2025-12-15T18:05:52.210Z
Link: CVE-2025-68130
Updated: 2025-12-16T21:38:34.471Z
Status : Deferred
Published: 2025-12-16T17:16:11.243
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-68130
No data.
OpenCVE Enrichment
Updated: 2025-12-16T20:45:07Z
Github GHSA