Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24888: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in microsoft maker.js

0
Medium
VulnerabilityCVE-2026-24888cvecve-2026-24888cwe-1321
Published: Wed Jan 28 2026 (01/28/2026, 21:35:44 UTC)
Source: CVE Database V5
Vendor/Project: microsoft
Product: maker.js

Description

CVE-2026-24888 is a medium severity prototype pollution vulnerability in Microsoft maker. js versions up to 0. 19. 1. The flaw arises from the makerjs. extendObject function, which copies properties from source objects without validating ownership or filtering dangerous keys, allowing malicious prototype properties to be injected. This can lead to unauthorized modification of object prototypes, potentially causing integrity and confidentiality issues in applications using maker. js for 2D vector drawing and CNC/laser cutting modeling. Exploitation requires no authentication or user interaction and can be performed remotely over the network. A patch addressing this issue is included in version 0.

AI-Powered Analysis

AILast updated: 01/28/2026, 22:05:13 UTC

Technical Analysis

CVE-2026-24888 is a prototype pollution vulnerability classified under CWE-1321 affecting Microsoft maker.js, a JavaScript library used for 2D vector line drawing and shape modeling, particularly in CNC and laser cutting applications. The vulnerability exists in the makerjs.extendObject function, which is responsible for copying properties from source objects to target objects. In versions up to and including 0.19.1, this function does not perform proper validation such as checking if properties are own properties via hasOwnProperty(), nor does it filter out dangerous keys. Consequently, inherited or maliciously crafted properties can be copied into target objects, leading to prototype pollution. Prototype pollution can allow attackers to manipulate the behavior of applications by altering object prototypes, potentially causing unexpected behavior, data leakage, or bypassing security controls. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. Although no known exploits are currently reported in the wild, the flaw's presence in a library used in manufacturing and design automation software could have serious implications if weaponized. A patch fixing the issue was committed and is expected in version 0.19.2. The CVSS v3.1 base score is 6.5, indicating a medium severity level with impacts on confidentiality and integrity but no impact on availability.

Potential Impact

For European organizations, especially those in manufacturing, industrial design, and CNC machining sectors, this vulnerability poses a risk of unauthorized modification of application behavior and data integrity within systems that utilize maker.js. Compromised prototype objects could lead to subtle data corruption, leakage of sensitive design information, or manipulation of CNC instructions, potentially causing defective manufacturing outputs or intellectual property theft. Since maker.js is used in automation and precision tooling, integrity issues could translate into costly production errors or safety hazards. Confidentiality impacts could expose proprietary designs or manufacturing parameters to attackers. The lack of availability impact reduces the risk of denial-of-service but does not diminish the potential for stealthy, persistent compromise. European companies integrating maker.js into their software toolchains or custom applications should consider this vulnerability a moderate risk that requires timely remediation to avoid operational and reputational damage.

Mitigation Recommendations

European organizations should immediately assess their use of maker.js and identify any systems running versions up to 0.19.1. The primary mitigation is to upgrade to version 0.19.2 or later, which contains the patch that properly validates property copying in extendObject. If upgrading is not immediately feasible, organizations should implement strict input validation and sanitization on any data passed to maker.js functions to prevent injection of malicious prototype properties. Employ runtime monitoring to detect anomalous prototype modifications or unexpected object behaviors. Incorporate static code analysis tools to identify unsafe object property manipulations in custom code using maker.js. Additionally, isolate maker.js usage within sandboxed environments or containers to limit the blast radius of potential exploitation. Maintain an inventory of affected assets and monitor threat intelligence sources for any emerging exploits targeting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-27T19:35:20.528Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697a84c24623b1157cf1f0bb

Added to database: 1/28/2026, 9:50:58 PM

Last enriched: 1/28/2026, 10:05:13 PM

Last updated: 1/28/2026, 11:14:17 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats