tarteaucitron.js allows prototype pollution via custom text injection
Moderate severity
GitHub Reviewed
Published
Apr 7, 2025
in
AmauriC/tarteaucitron.js
•
Updated Apr 7, 2025
Description
Published by the National Vulnerability Database
Apr 7, 2025
Published to the GitHub Advisory Database
Apr 7, 2025
Reviewed
Apr 7, 2025
Last updated
Apr 7, 2025
A vulnerability was identified in
tarteaucitron.js
, where theaddOrUpdate
function, used for applying custom texts, did not properly validate input. This allowed an attacker with direct access to the site's source code or a CMS plugin to manipulate JavaScript object prototypes, leading to potential security risks such as data corruption or unintended code execution.Impact
An attacker with high privileges could exploit this vulnerability to:
Fix AmauriC/tarteaucitron.js@74c354c
The issue was resolved by ensuring that user-controlled inputs cannot modify JavaScript object prototypes.
References