Bug 2449872 (CVE-2026-33228)

Summary: CVE-2026-33228 flatted: Flatted: Prototype pollution vulnerability allows arbitrary code execution via crafted JSON.
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: unspecifiedCC: aazores, abuckta, akostadi, alcohan, amasferr, aschwart, asoldano, ataylor, bbaranow, bdettelb, bmaxwell, boliveir, bsmejkal, bstansbe, caswilli, chfoley, cmah, dbruscin, dhanak, dkuc, dlofthou, dmayorov, doconnor, drosa, eaguilar, ebaron, ewittman, gmalinko, gparvin, ibek, istudens, ivassile, iweiss, jachapma, janstey, jbalunas, jcantril, jkoehler, jlledo, jolong, jrokos, kaycoth, kvanderr, kverlaen, lchilton, lphiri, mnovotny, mosmerov, mposolda, msvehla, nipatil, nwallace, orabin, pahickey, pantinor, pberan, pbizzarr, pdelbell, pesilva, pjindal, pmackay, progier, rgodfrey, rhaigner, rkubis, rmartinc, rojacob, rstancel, rstepani, sausingh, sfeifer, smaestri, snegrini, spichugi, ssidhaye, ssilvert, sthorger, swoodman, tbordaz, thjenkin, tsedmik, vashirov, vdosoudi, vmuzikar
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in flatted, a JavaScript Object Notation (JSON) parser designed for handling circular data structures. A remote attacker can exploit this vulnerability by providing specially crafted JSON input. The parse() function in flatted fails to properly validate string values used as array index keys, allowing an attacker to manipulate internal JavaScript object prototypes. This prototype pollution can enable an attacker to execute arbitrary code or cause a denial of service, impacting the availability and integrity of affected systems.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2451326, 2451327, 2451328, 2451330, 2451332, 2451333, 2451334, 2451336, 2451329, 2451331, 2451335, 2451337    
Bug Blocks:    

Description OSIDB Bzimport 2026-03-21 00:02:06 UTC
flatted is a circular JSON parser. Prior to version 3.4.2, the parse() function in flatted can use attacker-controlled string values from the parsed JSON as direct array index keys, without validating that they are numeric. Since the internal input buffer is a JavaScript Array, accessing it with the key "__proto__" returns Array.prototype via the inherited getter. This object is then treated as a legitimate parsed value and assigned as a property of the output object, effectively leaking a live reference to Array.prototype to the consumer. Any code that subsequently writes to that property will pollute the global prototype. This issue has been patched in version 3.4.2.