Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27125: CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes in sveltejs svelte

0
Medium
VulnerabilityCVE-2026-27125cvecve-2026-27125cwe-915
Published: Fri Feb 20 2026 (02/20/2026, 22:29:45 UTC)
Source: CVE Database V5
Vendor/Project: sveltejs
Product: svelte

Description

svelte performance oriented web framework. Prior to 5.51.5, in server-side rendering, attribute spreading on elements (e.g. <div {...attrs}>) enumerates inherited properties from the object's prototype chain rather than only own properties. In environments where Object.prototype has already been polluted — a precondition outside of Svelte's control — this can cause unexpected attributes to appear in SSR output or cause SSR to throw errors. Client-side rendering is not affected. This vulnerability is fixed in 5.51.5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 00:39:16 UTC

Technical Analysis

CVE-2026-27125 is a vulnerability classified under CWE-915 (Improperly Controlled Modification of Dynamically-Determined Object Attributes) affecting the Svelte framework, specifically in its server-side rendering (SSR) implementation prior to version 5.51.5. The root cause is that during SSR, when attribute spreading syntax (e.g., <div {...attrs}>) is used, the framework enumerates not only the object's own properties but also inherited properties from its prototype chain. If the Object.prototype has been polluted—meaning additional properties have been added to the global prototype—these unintended properties can be included in the SSR output. This can result in unexpected or malicious attributes being rendered into HTML, potentially causing rendering errors or injection of unintended data. The vulnerability does not affect client-side rendering, as the issue is specific to SSR attribute enumeration. Exploitation requires an environment where Object.prototype is polluted, which is outside Svelte's control, and partial authentication privileges. The CVSS 4.0 score is 5.3 (medium), reflecting moderate impact on confidentiality and integrity with a high scope. The vulnerability was publicly disclosed on February 20, 2026, and fixed in Svelte version 5.51.5. No known exploits have been reported in the wild.

Potential Impact

The vulnerability can lead to the injection of unexpected attributes into SSR-generated HTML, which may cause application errors or potentially expose sensitive data if the polluted prototype properties contain confidential information. This undermines the integrity of the rendered content and could disrupt application availability due to rendering failures. While client-side rendering remains unaffected, server-side rendered applications using vulnerable Svelte versions are at risk. Attackers with low privileges and partial authentication could exploit polluted prototype chains to influence SSR output, potentially leading to security issues such as information leakage or denial of service. The scope is high because it affects all SSR outputs in vulnerable versions, impacting any organization using Svelte for server-side rendering. Although no active exploits are known, the risk remains significant for web applications relying on SSR with Svelte versions prior to 5.51.5.

Mitigation Recommendations

The primary mitigation is to upgrade all Svelte instances to version 5.51.5 or later, where the vulnerability is fixed by restricting attribute spreading to own properties only. Additionally, organizations should audit their JavaScript environments to prevent pollution of Object.prototype, which is a prerequisite for exploitation. Implementing strict Content Security Policies (CSP) can help mitigate the impact of unexpected attributes if they lead to injection attacks. Developers should review SSR code for usage of attribute spreading and consider sanitizing or validating input objects before spreading attributes. Monitoring server logs for SSR errors or unexpected HTML attributes can help detect exploitation attempts. Finally, applying runtime protections that detect prototype pollution attempts can reduce the risk of this vulnerability being exploited.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-17T18:42:27.043Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6998e47bbe58cf853bd9f74e

Added to database: 2/20/2026, 10:47:23 PM

Last enriched: 2/28/2026, 12:39:16 AM

Last updated: 4/7/2026, 1:35:02 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses