Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-14020: Improperly Controlled Modification of Object Prototype Attributes in carboneio carbone

0
Low
VulnerabilityCVE-2024-14020cvecve-2024-14020
Published: Wed Jan 07 2026 (01/07/2026, 00:02:07 UTC)
Source: CVE Database V5
Vendor/Project: carboneio
Product: carbone

Description

A weakness has been identified in carboneio carbone up to fbcd349077ad0e8748be73eab2a82ea92b6f8a7e. This impacts an unknown function of the file lib/input.js of the component Formatter Handler. Executing a manipulation can lead to improperly controlled modification of object prototype attributes. The attack can be launched remotely. This attack is characterized by high complexity. The exploitability is said to be difficult. Upgrading to version 3.5.6 will fix this issue. This patch is called 04f9feb24bfca23567706392f9ad2c53bbe4134e. You should upgrade the affected component. A successful exploitation can "only occur if the parent NodeJS application has the same security issue".

AI-Powered Analysis

AILast updated: 01/07/2026, 00:33:52 UTC

Technical Analysis

CVE-2024-14020 identifies a prototype pollution vulnerability in the carboneio carbone library, a NodeJS-based document generation tool. The flaw exists in the Formatter Handler component, specifically within the lib/input.js file, where an attacker can manipulate object prototype attributes improperly. Prototype pollution allows an attacker to modify the base object prototype, potentially altering the behavior of all objects inheriting from it, which can lead to unexpected application behavior or security bypasses. The vulnerability can be exploited remotely without user interaction but requires high complexity due to the need for specific conditions and the prerequisite that the parent NodeJS application also contains the same security flaw. The vulnerability affects a specific commit version (fbcd349077ad0e8748be73eab2a82ea92b6f8a7e) and is fixed in version 3.5.6 by patch 04f9feb24bfca23567706392f9ad2c53bbe4134e. The CVSS 4.0 base score is 2.3, reflecting low severity due to limited impact and difficult exploitability. No public exploits have been reported, indicating a low likelihood of active attacks currently. The vulnerability's impact is primarily on confidentiality, integrity, and availability at a low level, given the limited scope and complexity.

Potential Impact

For European organizations using the carboneio carbone library in their NodeJS applications, this vulnerability could allow an attacker to perform prototype pollution attacks, potentially leading to altered application logic or security bypasses. Although the CVSS score is low and exploitation is complex, the impact could be more significant if the parent NodeJS application is also vulnerable, possibly enabling privilege escalation or data manipulation. Organizations relying on automated document generation or formatting services using carbone may face risks of data integrity issues or unexpected application behavior. However, the overall risk is limited due to the high complexity of exploitation and absence of known active exploits. Still, failure to patch could leave systems exposed to future, more sophisticated attacks. The impact on availability is minimal, but integrity and confidentiality could be moderately affected in worst-case scenarios.

Mitigation Recommendations

European organizations should promptly upgrade the carboneio carbone library to version 3.5.6 or later to apply the official patch (04f9feb24bfca23567706392f9ad2c53bbe4134e). Additionally, review and harden the parent NodeJS applications to ensure they do not contain similar prototype pollution vulnerabilities, as exploitation depends on the parent application's security posture. Implement strict input validation and sanitization in applications using carbone to reduce the risk of malicious input triggering prototype pollution. Employ runtime application self-protection (RASP) or behavior monitoring to detect anomalous prototype modifications. Regularly audit dependencies and monitor for updates or advisories related to carbone and related NodeJS components. Finally, conduct security testing focusing on prototype pollution vectors in development and staging environments before deploying updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-04T18:23:09.662Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695da690ee4c93a4aaaf9618

Added to database: 1/7/2026, 12:19:28 AM

Last enriched: 1/7/2026, 12:33:52 AM

Last updated: 1/8/2026, 5:18:53 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats