Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2cjr-5v3h-v2w4 | Evolver has Prototype Pollution via `Object.assign()` in its mailbox store operations |
Wed, 06 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Wed, 06 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 06 May 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Evomap
Evomap evolver |
|
| Vendors & Products |
Evomap
Evomap evolver |
Mon, 04 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Evolver is a GEP-powered self-evolving engine for AI agents. Prior to version 1.69.3, a prototype pollution vulnerability in the mailbox store module allows attackers to modify the behavior of all JavaScript objects by injecting malicious properties into Object.prototype. The vulnerability exists in the _applyUpdate() and _updateRecord() functions which use Object.assign() to merge user-controlled data without filtering dangerous keys like __proto__, constructor, or prototype. This issue has been patched in version 1.69.3. | |
| Title | Evolver: Prototype Pollution via `Object.assign()` in mailbox store operations | |
| Weaknesses | CWE-1321 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-06T13:40:54.808Z
Reserved: 2026-04-23T19:17:30.565Z
Link: CVE-2026-42077
Updated: 2026-05-06T13:38:42.448Z
Status : Deferred
Published: 2026-05-04T17:16:24.587
Modified: 2026-05-07T15:46:40.943
Link: CVE-2026-42077
No data.
OpenCVE Enrichment
Updated: 2026-05-06T09:22:45Z
Github GHSA