Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23736: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in lxsmnsyc seroval

0
High
VulnerabilityCVE-2026-23736cvecve-2026-23736cwe-1321
Published: Wed Jan 21 2026 (01/21/2026, 23:01:10 UTC)
Source: CVE Database V5
Vendor/Project: lxsmnsyc
Product: seroval

Description

CVE-2026-23736 is a high-severity prototype pollution vulnerability in the seroval JavaScript value stringification library (versions below 1. 4. 1). The flaw arises from improper input validation during JSON deserialization, allowing attackers to modify object prototype attributes maliciously. Exploitation requires no authentication or user interaction and can be performed remotely over the network. Successful attacks can lead to partial compromise of confidentiality, integrity, and availability of affected applications. The vulnerability is fixed in seroval version 1. 4. 1. European organizations using vulnerable versions in their JavaScript environments should prioritize updating to mitigate risks.

AI-Powered Analysis

AILast updated: 01/29/2026, 08:52:54 UTC

Technical Analysis

CVE-2026-23736 identifies a prototype pollution vulnerability in the seroval library, a tool designed to facilitate JavaScript value stringification beyond the capabilities of JSON.stringify. Specifically, versions 1.4.0 and earlier improperly validate input during JSON deserialization, allowing an attacker to inject malicious object keys that alter the prototype chain of JavaScript objects. This CWE-1321 vulnerability enables an attacker to manipulate the behavior of applications by corrupting object prototypes, potentially leading to arbitrary code execution, data tampering, or denial of service. The vulnerability is exploitable remotely without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact spans confidentiality, integrity, and availability, though the confidentiality and integrity impacts are partial, reflecting potential but not guaranteed data exposure or modification. The issue is limited to the JSON deserialization functionality of seroval and is resolved in version 1.4.1. While no known exploits have been reported in the wild, the vulnerability's characteristics suggest it could be leveraged in supply chain attacks or to compromise web applications relying on seroval for complex data serialization tasks.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to those developing or deploying JavaScript applications that incorporate seroval for advanced serialization tasks. Exploitation could allow attackers to manipulate application logic, corrupt data, or cause service disruptions, impacting business continuity and data security. Organizations in sectors such as finance, healthcare, and critical infrastructure, which rely heavily on web applications and JavaScript frameworks, may face increased exposure. The vulnerability could also be leveraged in supply chain attacks targeting software development pipelines. Given the remote, unauthenticated exploitability, attackers could scan for vulnerable instances and compromise systems at scale. The partial impact on confidentiality and integrity could lead to data breaches or unauthorized modifications, while availability impacts might cause denial of service conditions. This could result in regulatory compliance issues under GDPR and other European data protection laws, leading to financial and reputational damage.

Mitigation Recommendations

European organizations should immediately audit their software dependencies to identify usage of seroval versions below 1.4.1. Upgrading to seroval 1.4.1 or later is the primary and most effective mitigation. For environments where immediate upgrade is not feasible, implementing strict input validation and sanitization on JSON data before deserialization can reduce risk. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) configured to detect and block prototype pollution attack patterns. Incorporate security testing in CI/CD pipelines to detect vulnerable library versions and prototype pollution attempts. Monitor logs for anomalous object prototype modifications and unusual application behavior. Educate developers about the risks of prototype pollution and secure coding practices related to object deserialization. Finally, maintain an incident response plan tailored to JavaScript application compromises to quickly contain and remediate any exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-15T15:45:01.957Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69715f584623b1157cf35e60

Added to database: 1/21/2026, 11:20:56 PM

Last enriched: 1/29/2026, 8:52:54 AM

Last updated: 2/6/2026, 4:23:04 PM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats