Bug 2442905 (CVE-2026-27837) - CVE-2026-27837 dottie.js: dottie.js: Unauthorized object modification via prototype pollution bypass
Summary: CVE-2026-27837 dottie.js: dottie.js: Unauthorized object modification via pro...
Keywords:
Status: NEW
Alias: CVE-2026-27837
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-02-26 01:02 UTC by OSIDB Bzimport
Modified: 2026-02-26 09:23 UTC (History)
14 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-02-26 01:02:09 UTC
Dottie provides nested object access and manipulation in JavaScript. Versions 2.0.4 through 2.0.6 contain an incomplete fix for CVE-2023-26132. The prototype pollution guard introduced in commit `7d3aee1` only validates the first segment of a dot-separated path, allowing an attacker to bypass the protection by placing `__proto__` at any position other than the first. Both `dottie.set()` and `dottie.transform()` are affected. Version 2.0.7 contains an updated fix to address the residual vulnerability.


Note You need to log in before you can comment on or make changes to this bug.