Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36573: n/a

0
Critical
VulnerabilityCVE-2024-36573cvecve-2024-36573
Published: Mon Jun 17 2024 (06/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

almela obx before v.0.0.4 has a Prototype Pollution issue which allows arbitrary code execution via the obx/build/index.js:656), reduce (@almela/obx/build/index.js:470), Object.set (obx/build/index.js:269) component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:28:01 UTC

Technical Analysis

CVE-2024-36573 identifies a critical Prototype Pollution vulnerability in the almela obx JavaScript library, specifically in versions prior to 0.0.4. Prototype Pollution occurs when an attacker can modify the prototype of a base object, thereby influencing all objects inheriting from it. In this case, the vulnerability resides in the obx/build/index.js file, particularly in the functions at lines 656, 470, and 269, which correspond to obx, reduce, and Object.set components respectively. By exploiting this flaw, an attacker can inject or alter properties on the Object prototype, which can lead to arbitrary code execution within the affected environment. This means an attacker can execute malicious code remotely without any authentication or user interaction, making the attack vector network-based and highly accessible. The vulnerability is assigned a CVSS v3.1 score of 9.8, reflecting its critical severity due to the combination of network attack vector, no required privileges, no user interaction, and full impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild yet, the nature of Prototype Pollution combined with arbitrary code execution potential makes this a highly dangerous vulnerability. The affected versions are not explicitly listed beyond being prior to 0.0.4, suggesting all earlier versions are vulnerable. The weakness is categorized under CWE-1321, which relates to improper handling of prototype pollution in JavaScript. No official patches or fixes have been published at the time of disclosure, so users must rely on temporary mitigations and monitoring.

Potential Impact

The impact of CVE-2024-36573 is severe for organizations using the almela obx library in their JavaScript applications or Node.js environments. Successful exploitation can lead to full system compromise, including unauthorized access to sensitive data, modification or deletion of critical information, and disruption of service availability. Because the vulnerability allows arbitrary code execution without authentication or user interaction, attackers can remotely execute malicious payloads, potentially deploying ransomware, stealing credentials, or establishing persistent backdoors. This can affect web applications, backend services, and any system relying on the vulnerable library, leading to widespread operational and reputational damage. The critical severity and ease of exploitation increase the urgency for organizations to assess their exposure and implement mitigations. Additionally, the lack of an official patch increases the risk window, making proactive defense essential. Industries with high reliance on JavaScript frameworks, such as technology, finance, healthcare, and e-commerce, are particularly at risk due to the potential for data breaches and service outages.

Mitigation Recommendations

1. Immediate code review and audit: Identify all instances where almela obx is used within your codebase and assess the version in use. 2. Upgrade or patch: Monitor the official almela obx repository or vendor announcements for patches or updated versions that address CVE-2024-36573 and apply them promptly once available. 3. Temporary workarounds: Until a patch is released, implement input validation and sanitization to prevent untrusted data from influencing object prototypes. 4. Restrict prototype modification: Use JavaScript techniques such as Object.freeze() or Object.seal() on critical objects to prevent prototype pollution. 5. Employ runtime protection: Utilize application security tools or runtime application self-protection (RASP) solutions that can detect and block prototype pollution attempts. 6. Monitor logs and behavior: Set up alerts for unusual object property changes or suspicious code execution patterns in environments using almela obx. 7. Limit exposure: Restrict network access to services using the vulnerable library to trusted sources only. 8. Educate developers: Raise awareness among development teams about prototype pollution risks and secure coding practices to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-30T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c5fb7ef31ef0b5636f0

Added to database: 2/25/2026, 9:40:47 PM

Last enriched: 2/28/2026, 3:28:01 AM

Last updated: 4/12/2026, 5:08:19 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses