Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Prototype Pollution via the jsondiffpatch.patch() and jsondiffpatch/formatters/jsonpatch.patch() APIs. An attacker can perform prototype pollution by supplying crafted delta or JSON Patch documents, as attacker-controlled property names and path segments are used to traverse and modify objects without restricting access to special properties like __proto__ or constructor.prototype, allowing modification of Object.prototype.

Project Subscriptions

Vendors Products
Benjamine Subscribe
Jsondiffpatch Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 18 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 17 May 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Benjamine
Benjamine jsondiffpatch
Vendors & Products Benjamine
Benjamine jsondiffpatch

Sat, 16 May 2026 07:15:00 +0000

Type Values Removed Values Added
Title Prototype Pollution via Unfiltered Delta or JSON Patch Input in jsondiffpatch

Sat, 16 May 2026 05:30:00 +0000

Type Values Removed Values Added
Description Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Prototype Pollution via the jsondiffpatch.patch() and jsondiffpatch/formatters/jsonpatch.patch() APIs. An attacker can perform prototype pollution by supplying crafted delta or JSON Patch documents, as attacker-controlled property names and path segments are used to traverse and modify objects without restricting access to special properties like __proto__ or constructor.prototype, allowing modification of Object.prototype.
Weaknesses CWE-1321
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L/E:P'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2026-05-18T13:40:00.170Z

Reserved: 2026-05-15T06:27:57.484Z

Link: CVE-2026-8657

cve-icon Vulnrichment

Updated: 2026-05-18T13:39:42.992Z

cve-icon NVD

Status : Deferred

Published: 2026-05-16T06:16:18.727

Modified: 2026-05-19T15:38:48.397

Link: CVE-2026-8657

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-17T19:41:16Z

Weaknesses