Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core

0
High
VulnerabilityCVE-2026-25754cvecve-2026-25754cwe-1321
Published: Fri Feb 06 2026 (02/06/2026, 22:48:38 UTC)
Source: CVE Database V5
Vendor/Project: adonisjs
Product: core

Description

CVE-2026-25754 is a prototype pollution vulnerability in the AdonisJS core framework affecting versions prior to 10. 1. 3 and 11. 0. 0-next. 9. The flaw exists in the multipart form-data parsing component, allowing a remote attacker to manipulate object prototype attributes at runtime without authentication or user interaction. Exploitation can lead to partial compromise of confidentiality and integrity, potentially enabling attackers to alter application behavior or escalate privileges. The vulnerability has a CVSS score of 7. 2 (high severity) and has been patched in the specified versions.

AI-Powered Analysis

AILast updated: 02/06/2026, 23:14:46 UTC

Technical Analysis

CVE-2026-25754 identifies a prototype pollution vulnerability in the AdonisJS core framework, specifically within its multipart form-data parsing functionality. AdonisJS is a popular TypeScript-first web framework used for building server-side applications. Prototype pollution occurs when an attacker can modify the prototype of a base object, which in JavaScript affects all objects inheriting from that prototype. This can lead to unexpected behavior, security bypasses, or application logic corruption. The vulnerability allows a remote attacker to inject malicious properties into the object prototype without requiring authentication or user interaction, making it remotely exploitable over the network. The flaw affects all AdonisJS core versions prior to 10.1.3 and 11.0.0-next.9, where the multipart form-data parser does not properly sanitize or control input that modifies prototype attributes. Successful exploitation can lead to partial compromise of confidentiality and integrity by altering application state or bypassing security controls, though availability impact is not evident. The CVSS 3.1 score of 7.2 reflects the ease of exploitation (network vector, no privileges or user interaction needed) and the scope (changes can affect the entire application runtime). Although no exploits are currently known in the wild, the vulnerability poses a significant risk to applications relying on vulnerable AdonisJS versions. The issue has been addressed in versions 10.1.3 and 11.0.0-next.9 by sanitizing input and preventing prototype pollution during multipart form-data processing.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized modification of application behavior, potentially exposing sensitive data or enabling privilege escalation within web applications built on vulnerable AdonisJS versions. Given the widespread use of Node.js frameworks in Europe’s software development industry, especially in sectors like finance, healthcare, and e-commerce, exploitation could result in data breaches, compliance violations (e.g., GDPR), and reputational damage. The lack of authentication or user interaction requirements increases the risk of automated attacks. While no availability impact is indicated, integrity and confidentiality breaches can disrupt business operations and trust. Organizations running legacy or unpatched AdonisJS applications are particularly vulnerable. The threat is amplified in environments where multipart form-data is frequently processed, such as file upload features or REST APIs handling complex form submissions.

Mitigation Recommendations

European organizations should immediately upgrade all AdonisJS core dependencies to version 10.1.3 or later (including the 11.0.0-next.9 release or newer) to apply the official patch. Conduct thorough code audits focusing on multipart form-data handling to identify and remediate any unsafe prototype manipulations. Implement strict input validation and sanitization on all user-supplied data, especially multipart form submissions. Employ runtime application self-protection (RASP) or Web Application Firewalls (WAFs) with rules targeting prototype pollution patterns to detect and block suspicious payloads. Monitor application logs for anomalous object property modifications and unusual behavior indicative of exploitation attempts. Educate development teams on secure coding practices related to prototype pollution and JavaScript object handling. Finally, maintain an up-to-date inventory of applications using AdonisJS to ensure timely patch management and vulnerability response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-05T18:35:52.357Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69867278f9fa50a62f39d4fa

Added to database: 2/6/2026, 11:00:08 PM

Last enriched: 2/6/2026, 11:14:46 PM

Last updated: 2/7/2026, 12:08:07 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats