Description
Versions of the package spin.js before 3.0.0 are vulnerable to Cross-site Scripting (XSS) via the spin() function that allows a creation of more than 1 alert for each 'target' element. An attacker would need to set an arbitrary key-value pair on Object.prototype through a crafted URL achieving a prototype pollution first, before being able to execute arbitrary JavaScript in the context of the user's browser.
Published: 2026-03-11
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross-site Scripting – arbitrary JavaScript execution in the user’s browser
Action: Patch Upgrade
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Spin.js
Spin.js spin.js
CPEs cpe:2.3:a:spin.js:spin.js:*:*:*:*:*:node.js:*:*
Vendors & Products Spin.js
Spin.js spin.js

Fri, 20 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
Title Cross‑Site Scripting Vulnerability in spin.js via Prototype Pollution and Duplicate Alert Creation

Wed, 11 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Fgnass
Fgnass spin.js
Vendors & Products Fgnass
Fgnass spin.js

Wed, 11 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description Versions of the package spin.js before 3.0.0 are vulnerable to Cross-site Scripting (XSS) via the spin() function that allows a creation of more than 1 alert for each 'target' element. An attacker would need to set an arbitrary key-value pair on Object.prototype through a crafted URL achieving a prototype pollution first, before being able to execute arbitrary JavaScript in the context of the user's browser.
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2026-03-11T15:45:37.336Z

Reserved: 2026-03-10T15:23:07.934Z

Link: CVE-2026-3884

cve-icon Vulnrichment

Updated: 2026-03-11T15:45:34.043Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T06:17:15.183

Modified: 2026-05-07T18:08:05.353

Link: CVE-2026-3884

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:37:55Z

Weaknesses