Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qpfv-44f3-qqx6 | MikroORM has Prototype Pollution in Utils.merge |
Fri, 03 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mikro-orm mikroorm
|
|
| CPEs | cpe:2.3:a:mikro-orm:mikroorm:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Mikro-orm mikroorm
|
|
| Metrics |
cvssV3_1
|
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mikro-orm
Mikro-orm mikro-orm |
|
| Vendors & Products |
Mikro-orm
Mikro-orm mikro-orm |
Tue, 31 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 31 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MikroORM is a TypeScript ORM for Node.js based on Data Mapper, Unit of Work and Identity Map patterns. Prior to versions 6.6.10 and 7.0.6, a prototype pollution vulnerability exists in the Utils.merge helper used internally by MikroORM when merging object structures. The function did not prevent special keys such as __proto__, constructor, or prototype, allowing attacker-controlled input to modify the JavaScript object prototype when merged. This issue has been patched in versions 6.6.10 and 7.0.6. | |
| Title | MikroORM has Prototype Pollution in Utils.merge | |
| Weaknesses | CWE-1321 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-31T18:52:43.939Z
Reserved: 2026-03-26T15:57:52.324Z
Link: CVE-2026-34221
Updated: 2026-03-31T18:50:18.969Z
Status : Analyzed
Published: 2026-03-31T16:16:32.293
Modified: 2026-04-03T15:13:26.167
Link: CVE-2026-34221
No data.
OpenCVE Enrichment
Updated: 2026-04-03T21:17:39Z
Github GHSA