Prototype Pollution in rangy-core.js extend() function

Prototype Pollution in rangy-core.js extend() function

CVE-2023-26102 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

All versions of the package rangy are vulnerable to Prototype Pollution when using the extend() function in file rangy-core.js.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype

Learn more about our Web Application Penetration Testing UK.