Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-r5mx-6wc6-7h9w | dottie is vulnerable to Prototype Pollution bypass via non-first path segments in set() and transform() |
Sat, 28 Feb 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dottie Project
Dottie Project dottie |
|
| CPEs | cpe:2.3:a:dottie_project:dottie:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Dottie Project
Dottie Project dottie |
Fri, 27 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-915 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 26 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Feb 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mickhansen
Mickhansen dottie.js |
|
| Vendors & Products |
Mickhansen
Mickhansen dottie.js |
Thu, 26 Feb 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dottie provides nested object access and manipulation in JavaScript. Versions 2.0.4 through 2.0.6 contain an incomplete fix for CVE-2023-26132. The prototype pollution guard introduced in commit `7d3aee1` only validates the first segment of a dot-separated path, allowing an attacker to bypass the protection by placing `__proto__` at any position other than the first. Both `dottie.set()` and `dottie.transform()` are affected. Version 2.0.7 contains an updated fix to address the residual vulnerability. | |
| Title | Dottie vulnerable to prototype pollution bypass via non-first path segments in set() and transform() | |
| Weaknesses | CWE-1321 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-26T14:40:07.451Z
Reserved: 2026-02-24T02:32:39.801Z
Link: CVE-2026-27837
Updated: 2026-02-26T14:39:49.575Z
Status : Analyzed
Published: 2026-02-26T01:16:24.937
Modified: 2026-02-28T00:58:17.540
Link: CVE-2026-27837
OpenCVE Enrichment
Updated: 2026-04-18T19:45:08Z
Github GHSA