Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hmx5-qpq5-p643 | Prototype pollution in swiper |
Wed, 25 Feb 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Feb 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Swiperjs
Swiperjs swiper |
|
| CPEs | cpe:2.3:a:swiperjs:swiper:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Swiperjs
Swiperjs swiper |
|
| Metrics |
cvssV3_1
|
Mon, 23 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nolimits4web
Nolimits4web swiper |
|
| Vendors & Products |
Nolimits4web
Nolimits4web swiper |
Sat, 21 Feb 2026 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Swiper is a free and mobile touch slider with hardware accelerated transitions and native behavior. Versions 6.5.1 through 12.1.1 have a Prototype pollution vulnerability. The vulnerability resides in line 94 of shared/utils.mjs, where the indexOf() function is used to check whether user provided input contain forbidden strings. Despite a previous fix that attempted to mitigate prototype pollution by checking whether user input contained a forbidden key, it is still possible to pollute Object.prototype via a crafted input using Array.prototype. The exploit works across Windows and Linux and on Node and Bun runtimes. Any application that processes attacker-controlled input using this package may be affected by the following: Authentication Bypass, Denial of Service and RCE. This issue is fixed in version 12.1.2. | |
| Title | Swiper has a Prototype Pollution Vulnerability | |
| Weaknesses | CWE-1321 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-24T18:53:04.131Z
Reserved: 2026-02-18T19:47:02.156Z
Link: CVE-2026-27212
Updated: 2026-02-24T18:52:57.132Z
Status : Analyzed
Published: 2026-02-21T06:17:01.443
Modified: 2026-02-24T15:16:56.670
Link: CVE-2026-27212
No data.
OpenCVE Enrichment
Updated: 2026-04-17T17:00:10Z
Github GHSA