<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-46681 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-46681/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 21:44:33 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-46681/feed.xml" rel="self" type="application/rss+xml"/><item><title>Prototype Pollution Vulnerability in @nevware21/ts-utils Library (CVE-2026-46681)</title><link>https://feed.craftedsignal.io/briefs/2026-05-ts-utils-prototype-pollution/</link><pubDate>Thu, 21 May 2026 21:44:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-ts-utils-prototype-pollution/</guid><description>The `_copyProps` function in the `@nevware21/ts-utils` library is vulnerable to prototype pollution due to the use of `for...in` without proper `hasOwnProperty` checks, allowing attackers to modify object prototypes by injecting properties like `__proto__`.</description><content:encoded><![CDATA[<p>The <code>@nevware21/ts-utils</code> library, versions 0.13.0 and earlier, contains a prototype pollution vulnerability (CVE-2026-46681) in the <code>_copyProps</code> function located in <code>lib/src/object/copy.ts</code>. This function iterates through the properties of a source object using a <code>for...in</code> loop without checking if the properties belong directly to the object (i.e., without using <code>hasOwnProperty</code>). Consequently, an attacker can inject malicious properties, such as <code>__proto__</code>, into the prototype chain of all objects within the application. By providing crafted JSON input with a <code>__proto__</code> property, attackers can overwrite properties of the base object prototype, leading to potential code execution or denial-of-service conditions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a JSON object containing a <code>__proto__</code> property with malicious values.</li>
<li>The application parses the malicious JSON object, potentially from an untrusted source (e.g., user input or external API).</li>
<li>The <code>objDeepCopy</code> function in <code>@nevware21/ts-utils</code> is called with the malicious object as an argument.</li>
<li>The <code>objDeepCopy</code> function internally uses the vulnerable <code>_copyProps</code> function.</li>
<li>The <code>_copyProps</code> function iterates over the properties of the malicious object using <code>for...in</code>.</li>
<li>Due to the absence of <code>hasOwnProperty</code> checks, the <code>__proto__</code> property is processed.</li>
<li>The <code>__proto__</code> property&rsquo;s value is used to modify the prototype of the target object.</li>
<li>All subsequently created objects in the application inherit the polluted prototype, potentially leading to code execution or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to pollute the prototype of all objects in the application. This can lead to unexpected behavior, code execution, or denial-of-service conditions. The vulnerability affects applications using <code>@nevware21/ts-utils</code> versions 0.13.0 and earlier that process untrusted JSON input. This vulnerability has a high severity due to its potential to compromise the integrity and availability of affected applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a version of <code>@nevware21/ts-utils</code> that includes the fix for CVE-2026-46681.</li>
<li>Apply the suggested fix to the vulnerable <code>_copyProps</code> function by adding an <code>objHasOwnProperty</code> check and filtering <code>__proto__</code>, <code>constructor</code>, and <code>prototype</code> keys.</li>
<li>Deploy the Sigma rule &ldquo;Detect Prototype Pollution via <strong>proto</strong> Modification&rdquo; to identify attempts to exploit this vulnerability based on registry modifications that target <code>__proto__</code>.</li>
<li>Implement input validation to sanitize JSON data before processing it with <code>objDeepCopy</code>, filtering out potentially malicious properties like <code>__proto__</code>.</li>
<li>Audit existing code that uses <code>@nevware21/ts-utils</code> to ensure that it does not process untrusted JSON input without proper sanitization.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>prototype-pollution</category><category>javascript</category><category>vulnerability</category><category>cve-2026-46681</category></item></channel></rss>