Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hj76-42vx-jwp4 | seroval Affected by Prototype Pollution via JSON Deserialization |
Fri, 27 Feb 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:lxsmnsyc:seroval:*:*:*:*:*:node.js:*:* |
Fri, 23 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lxsmnsyc
Lxsmnsyc seroval |
|
| Vendors & Products |
Lxsmnsyc
Lxsmnsyc seroval |
Thu, 22 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 22 Jan 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 21 Jan 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0 and below, due to improper input validation, a malicious object key can lead to prototype pollution during JSON deserialization. This vulnerability affects only JSON deserialization functionality. This issue is fixed in version 1.4.1. | |
| Title | seroval Affected by Prototype Pollution via JSON Deserialization | |
| Weaknesses | CWE-1321 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-22T14:45:53.950Z
Reserved: 2026-01-15T15:45:01.957Z
Link: CVE-2026-23736
Updated: 2026-01-22T14:45:51.268Z
Status : Analyzed
Published: 2026-01-21T23:15:52.340
Modified: 2026-02-27T19:36:50.543
Link: CVE-2026-23736
OpenCVE Enrichment
Updated: 2026-04-18T15:30:03Z
Github GHSA