CVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
CVE-2026-25754 is a prototype pollution vulnerability in the AdonisJS core framework affecting versions prior to 10. 1. 3 and 11. 0. 0-next. 9. The flaw exists in the multipart form-data parsing component, allowing a remote attacker to manipulate object prototype attributes at runtime without authentication or user interaction. Exploitation can lead to partial compromise of confidentiality and integrity, potentially enabling attackers to alter application behavior or escalate privileges. The vulnerability has a CVSS score of 7. 2 (high severity) and has been patched in the specified versions.
AI Analysis
Technical Summary
CVE-2026-25754 identifies a prototype pollution vulnerability in the AdonisJS core framework, specifically within its multipart form-data parsing functionality. AdonisJS is a popular TypeScript-first web framework used for building server-side applications. Prototype pollution occurs when an attacker can modify the prototype of a base object, which in JavaScript affects all objects inheriting from that prototype. This can lead to unexpected behavior, security bypasses, or application logic corruption. The vulnerability allows a remote attacker to inject malicious properties into the object prototype without requiring authentication or user interaction, making it remotely exploitable over the network. The flaw affects all AdonisJS core versions prior to 10.1.3 and 11.0.0-next.9, where the multipart form-data parser does not properly sanitize or control input that modifies prototype attributes. Successful exploitation can lead to partial compromise of confidentiality and integrity by altering application state or bypassing security controls, though availability impact is not evident. The CVSS 3.1 score of 7.2 reflects the ease of exploitation (network vector, no privileges or user interaction needed) and the scope (changes can affect the entire application runtime). Although no exploits are currently known in the wild, the vulnerability poses a significant risk to applications relying on vulnerable AdonisJS versions. The issue has been addressed in versions 10.1.3 and 11.0.0-next.9 by sanitizing input and preventing prototype pollution during multipart form-data processing.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized modification of application behavior, potentially exposing sensitive data or enabling privilege escalation within web applications built on vulnerable AdonisJS versions. Given the widespread use of Node.js frameworks in Europe’s software development industry, especially in sectors like finance, healthcare, and e-commerce, exploitation could result in data breaches, compliance violations (e.g., GDPR), and reputational damage. The lack of authentication or user interaction requirements increases the risk of automated attacks. While no availability impact is indicated, integrity and confidentiality breaches can disrupt business operations and trust. Organizations running legacy or unpatched AdonisJS applications are particularly vulnerable. The threat is amplified in environments where multipart form-data is frequently processed, such as file upload features or REST APIs handling complex form submissions.
Mitigation Recommendations
European organizations should immediately upgrade all AdonisJS core dependencies to version 10.1.3 or later (including the 11.0.0-next.9 release or newer) to apply the official patch. Conduct thorough code audits focusing on multipart form-data handling to identify and remediate any unsafe prototype manipulations. Implement strict input validation and sanitization on all user-supplied data, especially multipart form submissions. Employ runtime application self-protection (RASP) or Web Application Firewalls (WAFs) with rules targeting prototype pollution patterns to detect and block suspicious payloads. Monitor application logs for anomalous object property modifications and unusual behavior indicative of exploitation attempts. Educate development teams on secure coding practices related to prototype pollution and JavaScript object handling. Finally, maintain an up-to-date inventory of applications using AdonisJS to ensure timely patch management and vulnerability response.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Ireland
CVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
Description
CVE-2026-25754 is a prototype pollution vulnerability in the AdonisJS core framework affecting versions prior to 10. 1. 3 and 11. 0. 0-next. 9. The flaw exists in the multipart form-data parsing component, allowing a remote attacker to manipulate object prototype attributes at runtime without authentication or user interaction. Exploitation can lead to partial compromise of confidentiality and integrity, potentially enabling attackers to alter application behavior or escalate privileges. The vulnerability has a CVSS score of 7. 2 (high severity) and has been patched in the specified versions.
AI-Powered Analysis
Technical Analysis
CVE-2026-25754 identifies a prototype pollution vulnerability in the AdonisJS core framework, specifically within its multipart form-data parsing functionality. AdonisJS is a popular TypeScript-first web framework used for building server-side applications. Prototype pollution occurs when an attacker can modify the prototype of a base object, which in JavaScript affects all objects inheriting from that prototype. This can lead to unexpected behavior, security bypasses, or application logic corruption. The vulnerability allows a remote attacker to inject malicious properties into the object prototype without requiring authentication or user interaction, making it remotely exploitable over the network. The flaw affects all AdonisJS core versions prior to 10.1.3 and 11.0.0-next.9, where the multipart form-data parser does not properly sanitize or control input that modifies prototype attributes. Successful exploitation can lead to partial compromise of confidentiality and integrity by altering application state or bypassing security controls, though availability impact is not evident. The CVSS 3.1 score of 7.2 reflects the ease of exploitation (network vector, no privileges or user interaction needed) and the scope (changes can affect the entire application runtime). Although no exploits are currently known in the wild, the vulnerability poses a significant risk to applications relying on vulnerable AdonisJS versions. The issue has been addressed in versions 10.1.3 and 11.0.0-next.9 by sanitizing input and preventing prototype pollution during multipart form-data processing.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized modification of application behavior, potentially exposing sensitive data or enabling privilege escalation within web applications built on vulnerable AdonisJS versions. Given the widespread use of Node.js frameworks in Europe’s software development industry, especially in sectors like finance, healthcare, and e-commerce, exploitation could result in data breaches, compliance violations (e.g., GDPR), and reputational damage. The lack of authentication or user interaction requirements increases the risk of automated attacks. While no availability impact is indicated, integrity and confidentiality breaches can disrupt business operations and trust. Organizations running legacy or unpatched AdonisJS applications are particularly vulnerable. The threat is amplified in environments where multipart form-data is frequently processed, such as file upload features or REST APIs handling complex form submissions.
Mitigation Recommendations
European organizations should immediately upgrade all AdonisJS core dependencies to version 10.1.3 or later (including the 11.0.0-next.9 release or newer) to apply the official patch. Conduct thorough code audits focusing on multipart form-data handling to identify and remediate any unsafe prototype manipulations. Implement strict input validation and sanitization on all user-supplied data, especially multipart form submissions. Employ runtime application self-protection (RASP) or Web Application Firewalls (WAFs) with rules targeting prototype pollution patterns to detect and block suspicious payloads. Monitor application logs for anomalous object property modifications and unusual behavior indicative of exploitation attempts. Educate development teams on secure coding practices related to prototype pollution and JavaScript object handling. Finally, maintain an up-to-date inventory of applications using AdonisJS to ensure timely patch management and vulnerability response.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-05T18:35:52.357Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69867278f9fa50a62f39d4fa
Added to database: 2/6/2026, 11:00:08 PM
Last enriched: 2/6/2026, 11:14:46 PM
Last updated: 2/7/2026, 12:08:07 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalCVE-2026-25793: CWE-347: Improper Verification of Cryptographic Signature in slackhq nebula
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.