Bug 2449872 (CVE-2026-33228) - CVE-2026-33228 flatted: Flatted: Prototype pollution vulnerability allows arbitrary code execution via crafted JSON.
Summary: CVE-2026-33228 flatted: Flatted: Prototype pollution vulnerability allows arb...
Keywords:
Status: NEW
Alias: CVE-2026-33228
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2451326 2451327 2451328 2451330 2451332 2451333 2451334 2451336 2451329 2451331 2451335 2451337
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-21 00:02 UTC by OSIDB Bzimport
Modified: 2026-03-26 00:29 UTC (History)
84 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-21 00:02:06 UTC
flatted is a circular JSON parser. Prior to version 3.4.2, the parse() function in flatted can use attacker-controlled string values from the parsed JSON as direct array index keys, without validating that they are numeric. Since the internal input buffer is a JavaScript Array, accessing it with the key "__proto__" returns Array.prototype via the inherited getter. This object is then treated as a legitimate parsed value and assigned as a property of the output object, effectively leaking a live reference to Array.prototype to the consumer. Any code that subsequently writes to that property will pollute the global prototype. This issue has been patched in version 3.4.2.


Note You need to log in before you can comment on or make changes to this bug.