Skip to content

Commit e73006a

Browse files
1 parent 3311826 commit e73006a

6 files changed

Lines changed: 39 additions & 11 deletions

File tree

advisories/github-reviewed/2026/01/GHSA-37qj-frw5-hhjh/GHSA-37qj-frw5-hhjh.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-37qj-frw5-hhjh",
4-
"modified": "2026-02-11T18:38:19Z",
4+
"modified": "2026-02-11T23:13:02Z",
55
"published": "2026-01-30T20:10:14Z",
66
"aliases": [
77
"CVE-2026-25128"
@@ -62,6 +62,7 @@
6262
],
6363
"database_specific": {
6464
"cwe_ids": [
65+
"CWE-20",
6566
"CWE-248"
6667
],
6768
"severity": "HIGH",

advisories/github-reviewed/2026/02/GHSA-2c4m-g7rx-63q7/GHSA-2c4m-g7rx-63q7.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2c4m-g7rx-63q7",
4-
"modified": "2026-02-11T15:13:28Z",
4+
"modified": "2026-02-11T23:12:52Z",
55
"published": "2026-02-11T15:13:28Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2026-26021"
8+
],
79
"summary": "set-in Affected by Prototype Pollution",
810
"details": "### Summary\nA prototype pollution vulnerability exists in the the npm package set-in (>=2.0.1). Despite a previous fix that attempted to mitigate prototype pollution by checking whether user input contained a forbidden key, it is still possible to pollute Object.prototype via a crafted input using Array.prototype. This has been fixed in version 2.0.5.\n\n### Details\nThe vulnerability resides in line 28 of https://github.com/ahdinosaur/set-in/blob/master/index.js where includes() function is used to check whether user provided input contain forbidden strings.\n\n### PoC\n#### Steps to reproduce\n1. Install latest version of set-in using npm install or cloning from git\n2. Run the following code snippet:\n\n```javascript\nArray.prototype.includes = () => false; \nconst si = require('set-in');\nconst obj = {};\nconsole.log({}.polluted);\nsi(obj, [\n 'constructor',\n 'prototype',\n 'polluted'\n], 'yes');\nconsole.log('{ ' + obj.polluted + ', ' + 'yes' + ' }'); // prints yes -> indicating that the patch was bypassed and prototype pollution occurred\n```\n\n#### Expected behavior\nPrototype pollution should be prevented and {} should not gain new properties.\nThis should be printed on the console:\n```\nundefined\nundefined OR throw an Error\n```\n\n#### Actual behavior\nObject.prototype is polluted\nThis is printed on the console:\n```\nundefined \nyes\n```\n\n### Impact\nThis is a prototype pollution vulnerability, which can have severe security implications depending on how set-in is used by downstream applications. Any application that processes attacker-controlled input using this package may be affected.\nIt could potentially lead to the following problems:\n1. Authentication bypass\n2. Denial of service\n3. Remote code execution (if polluted property is passed to sinks like eval or child_process)",
911
"severity": [

advisories/github-reviewed/2026/02/GHSA-33mh-2634-fwr2/GHSA-33mh-2634-fwr2.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-33mh-2634-fwr2",
4-
"modified": "2026-02-09T22:39:44Z",
4+
"modified": "2026-02-11T23:13:21Z",
55
"published": "2026-02-09T20:37:05Z",
66
"aliases": [
77
"CVE-2026-25765"
@@ -63,6 +63,10 @@
6363
"type": "WEB",
6464
"url": "https://github.com/lostisland/faraday/releases/tag/v2.14.1"
6565
},
66+
{
67+
"type": "WEB",
68+
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/faraday/CVE-2026-25765.yml"
69+
},
6670
{
6771
"type": "WEB",
6872
"url": "https://www.rfc-editor.org/rfc/rfc3986#section-5.2.2"

advisories/github-reviewed/2026/02/GHSA-ff9r-ww9c-43x8/GHSA-ff9r-ww9c-43x8.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-ff9r-ww9c-43x8",
4-
"modified": "2026-02-11T18:17:59Z",
4+
"modified": "2026-02-11T23:14:14Z",
55
"published": "2026-02-11T18:17:58Z",
66
"aliases": [
77
"CVE-2026-25759"
@@ -40,6 +40,14 @@
4040
"type": "WEB",
4141
"url": "https://github.com/statamic/cms/security/advisories/GHSA-ff9r-ww9c-43x8"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25759"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/statamic/cms/commit/6ed4f65f3387686d6dbd816e9b4f18a8d9736ff6"
50+
},
4351
{
4452
"type": "PACKAGE",
4553
"url": "https://github.com/statamic/cms"
@@ -56,6 +64,6 @@
5664
"severity": "HIGH",
5765
"github_reviewed": true,
5866
"github_reviewed_at": "2026-02-11T18:17:58Z",
59-
"nvd_published_at": null
67+
"nvd_published_at": "2026-02-11T21:16:19Z"
6068
}
6169
}

advisories/github-reviewed/2026/02/GHSA-gwmx-9gcj-332h/GHSA-gwmx-9gcj-332h.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gwmx-9gcj-332h",
4-
"modified": "2026-02-11T16:53:35Z",
4+
"modified": "2026-02-11T23:14:08Z",
55
"published": "2026-02-11T16:53:35Z",
66
"aliases": [
77
"CVE-2026-25633"
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/statamic/cms/security/advisories/GHSA-gwmx-9gcj-332h"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25633"
65+
},
6266
{
6367
"type": "WEB",
6468
"url": "https://github.com/statamic/cms/pull/13883"
@@ -87,6 +91,6 @@
8791
"severity": "MODERATE",
8892
"github_reviewed": true,
8993
"github_reviewed_at": "2026-02-11T16:53:35Z",
90-
"nvd_published_at": null
94+
"nvd_published_at": "2026-02-11T21:16:18Z"
9195
}
9296
}

advisories/github-reviewed/2026/02/GHSA-m4g2-2q66-vc9v/GHSA-m4g2-2q66-vc9v.json

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m4g2-2q66-vc9v",
4-
"modified": "2026-02-11T18:39:34Z",
4+
"modified": "2026-02-11T23:14:19Z",
55
"published": "2026-02-11T18:39:34Z",
66
"aliases": [
77
"CVE-2026-25935"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/go-vikunja/vikunja/security/advisories/GHSA-m4g2-2q66-vc9v"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25935"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/go-vikunja/vikunja/commit/dd0b82f00a8c9ded1c19a1e643a197c514be6d37"
@@ -51,15 +55,20 @@
5155
{
5256
"type": "WEB",
5357
"url": "https://github.com/go-vikunja/vikunja/releases/tag/v1.1.0"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://vikunja.io/changelog/vikunja-v1.1.0-was-released"
5462
}
5563
],
5664
"database_specific": {
5765
"cwe_ids": [
58-
"CWE-79"
66+
"CWE-79",
67+
"CWE-80"
5968
],
6069
"severity": "HIGH",
6170
"github_reviewed": true,
6271
"github_reviewed_at": "2026-02-11T18:39:34Z",
63-
"nvd_published_at": null
72+
"nvd_published_at": "2026-02-11T21:16:20Z"
6473
}
6574
}

0 commit comments

Comments
 (0)