Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36583: n/a

0
High
VulnerabilityCVE-2024-36583cvecve-2024-36583
Published: Mon Jun 17 2024 (06/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-36583 is a high-severity Prototype Pollution vulnerability in the @byondreal/accessor package version 1. 0. 0 and earlier. This flaw allows an unauthenticated attacker to execute arbitrary code remotely by exploiting the prototype pollution issue in the library. The vulnerability impacts confidentiality, integrity, and availability, with a CVSS score of 8. 1, indicating a significant risk. No known exploits are currently reported in the wild, and no patches have been published yet. Organizations using this package in their software stacks are at risk of remote code execution attacks without user interaction. The vulnerability requires network access but no privileges or user interaction, making it easier to exploit in exposed environments. Mitigation involves monitoring for updates from the vendor, applying patches promptly once available, and auditing dependencies for this package.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:05:46 UTC

Technical Analysis

CVE-2024-36583 is a Prototype Pollution vulnerability identified in the @byondreal/accessor npm package, specifically versions 1.0.0 and earlier. Prototype Pollution occurs when an attacker manipulates the prototype of a base object, leading to unexpected behavior in the application, including arbitrary code execution. In this case, the vulnerability allows an attacker to inject malicious properties into JavaScript objects via the package's index module, which can escalate to remote code execution (RCE). The CVSS v3.1 score of 8.1 reflects a high-severity issue with network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability is classified under CWE-1321, which relates to improper handling of prototype pollution. No patches or fixes have been released at the time of publication (June 17, 2024), and no known exploits have been observed in the wild. This vulnerability poses a critical risk to applications that depend on this package, especially those exposed to untrusted inputs or internet-facing environments. Attackers can exploit this flaw remotely without authentication, making it a significant threat vector for supply chain and runtime attacks in JavaScript environments.

Potential Impact

The impact of CVE-2024-36583 is substantial for organizations worldwide that utilize the @byondreal/accessor package in their software projects, particularly in Node.js environments. Successful exploitation can lead to remote code execution, allowing attackers to gain full control over affected systems. This compromises the confidentiality of sensitive data, integrity of application logic, and availability of services. Organizations may face data breaches, service disruptions, and potential lateral movement within networks. The vulnerability's ease of exploitation without authentication or user interaction increases the risk of automated attacks and wormable exploits. Enterprises relying on this package in web applications, microservices, or backend systems exposed to the internet are especially vulnerable. The lack of an available patch at the time of disclosure further exacerbates the risk, necessitating immediate mitigation efforts to prevent exploitation. Additionally, the vulnerability could be leveraged in supply chain attacks, affecting downstream projects and clients that incorporate this package.

Mitigation Recommendations

1. Immediate auditing of all software dependencies to identify usage of @byondreal/accessor package version 1.0.0 or earlier. 2. Implement strict input validation and sanitization to reduce the risk of prototype pollution attacks where possible. 3. Monitor official repositories and security advisories for patches or updates addressing this vulnerability and apply them promptly once available. 4. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) with rules designed to detect and block prototype pollution attack patterns. 5. Use dependency scanning tools integrated into CI/CD pipelines to detect vulnerable package versions automatically. 6. Consider isolating or sandboxing components that use this package to limit the blast radius of potential exploitation. 7. Educate development teams about prototype pollution risks and secure coding practices to prevent similar vulnerabilities in custom code. 8. If immediate patching is not possible, consider temporary mitigation by restricting network exposure of affected services and limiting access to trusted users only.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-30T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c61b7ef31ef0b56379c

Added to database: 2/25/2026, 9:40:49 PM

Last enriched: 2/26/2026, 5:05:46 AM

Last updated: 2/26/2026, 9:35:07 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats