Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27212: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in nolimits4web swiper

0
Critical
VulnerabilityCVE-2026-27212cvecve-2026-27212cwe-1321
Published: Sat Feb 21 2026 (02/21/2026, 05:43:07 UTC)
Source: CVE Database V5
Vendor/Project: nolimits4web
Product: swiper

Description

Swiper is a free and mobile touch slider with hardware accelerated transitions and native behavior. Versions 6.5.1 through 12.1.1 have a Prototype pollution vulnerability. The vulnerability resides in line 94 of shared/utils.mjs, where the indexOf() function is used to check whether user provided input contain forbidden strings. Despite a previous fix that attempted to mitigate prototype pollution by checking whether user input contained a forbidden key, it is still possible to pollute Object.prototype via a crafted input using Array.prototype. The exploit works across Windows and Linux and on Node and Bun runtimes. Any application that processes attacker-controlled input using this package may be affected by the following: Authentication Bypass, Denial of Service and RCE. This issue is fixed in version 12.1.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 12:39:03 UTC

Technical Analysis

The vulnerability CVE-2026-27212 in the nolimits4web swiper library is a prototype pollution issue classified under CWE-1321. It affects swiper versions from 6.5.1 up to but not including 12.1.2. The root cause lies in the shared/utils.mjs file, specifically at line 94, where the indexOf() function is used to check user input for forbidden strings. Although a prior fix attempted to prevent prototype pollution by filtering out forbidden keys, the check is insufficient because it does not account for pollution via Array.prototype. This allows an attacker to inject malicious properties into Object.prototype, which can then be inherited by all objects, leading to widespread application state corruption. The exploit works on both Windows and Linux platforms and affects applications running on Node.js and Bun runtimes. The consequences of successful exploitation include authentication bypass, denial of service, and remote code execution, making it a highly critical threat. The vulnerability does not require authentication or user interaction, increasing its risk profile. The issue was publicly disclosed on February 21, 2026, and fixed in swiper version 12.1.2. No known exploits are currently reported in the wild, but the high CVSS score reflects the potential severity.

Potential Impact

The impact of CVE-2026-27212 is significant for organizations worldwide that use the swiper library in web or mobile applications, especially those processing untrusted input. Prototype pollution can lead to severe security breaches such as authentication bypass, allowing attackers to gain unauthorized access. Denial of service conditions may arise from corrupted application state or crashes triggered by polluted prototypes. Remote code execution is particularly dangerous as it can enable full system compromise, data theft, or lateral movement within networks. Since swiper is widely used in front-end development for mobile and web interfaces, many organizations, including e-commerce, SaaS providers, and enterprises with customer-facing applications, are at risk. The vulnerability affects both Windows and Linux environments and multiple JavaScript runtimes, broadening the attack surface. The absence of required authentication or user interaction means attackers can exploit this remotely and autonomously, increasing the threat's severity and urgency for remediation.

Mitigation Recommendations

To mitigate CVE-2026-27212, organizations should immediately upgrade the swiper library to version 12.1.2 or later, where the vulnerability is patched. If upgrading is not immediately feasible, implement strict input validation and sanitization on all data passed to swiper, specifically filtering out any keys or values that could manipulate prototype chains, including those related to Array.prototype. Employ runtime application self-protection (RASP) or Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads attempting prototype pollution. Conduct thorough code reviews and static analysis focusing on object property assignments and prototype manipulations in the application codebase. Monitor application logs for unusual behavior indicative of prototype pollution exploitation attempts. Additionally, isolate critical services and apply the principle of least privilege to limit the impact of potential remote code execution. Finally, maintain an up-to-date inventory of swiper usage across projects to ensure no vulnerable versions remain in production.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-18T19:47:02.156Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69994a6fbe58cf853b51dfc0

Added to database: 2/21/2026, 6:02:23 AM

Last enriched: 2/28/2026, 12:39:03 PM

Last updated: 4/7/2026, 1:07:12 PM

Views: 748

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses