CVE-2026-28794: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in middleapi orpc
CVE-2026-28794 is a critical prototype pollution vulnerability in the @orpc/client package of the middleapi orpc tool, affecting versions prior to 1. 13. 6. The flaw allows unauthenticated remote attackers to inject arbitrary properties into the global Object. prototype via the RPC JSON deserializer. This pollution persists for the lifetime of the Node. js process, impacting all objects and potentially enabling severe security breaches such as authentication bypass, denial of service, and remote code execution. The vulnerability requires no authentication or user interaction and has a CVSS 4. 0 score of 9. 3, indicating critical severity.
AI Analysis
Technical Summary
CVE-2026-28794 is a prototype pollution vulnerability classified under CWE-1321, found in the RPC JSON deserializer component of the @orpc/client package within the middleapi orpc tool. The orpc tool facilitates building APIs that are end-to-end type-safe and compliant with OpenAPI standards. Versions prior to 1.13.6 allow unauthenticated remote attackers to manipulate the global Object.prototype by injecting arbitrary properties through crafted JSON payloads. Prototype pollution occurs when an attacker modifies the prototype of a base object, causing all objects inheriting from it to inherit malicious or unexpected properties. In Node.js environments, this pollution persists for the entire process lifetime, affecting all objects and potentially leading to severe consequences such as bypassing authentication mechanisms, causing denial of service by corrupting application logic, or even enabling remote code execution if exploited in conjunction with other vulnerabilities. The vulnerability is remotely exploitable without any authentication or user interaction, making it highly dangerous. The issue was publicly disclosed and assigned a CVSS 4.0 score of 9.3, reflecting its critical impact on confidentiality, integrity, and availability. The vulnerability has been fixed in version 1.13.6 of the @orpc/client package, and users are strongly advised to upgrade. No known active exploits have been reported yet, but the ease of exploitation and potential impact make this a high-priority patch.
Potential Impact
The impact of CVE-2026-28794 is significant for organizations using the middleapi orpc tool, especially those relying on the @orpc/client package versions prior to 1.13.6. Because the vulnerability allows unauthenticated remote attackers to inject properties into the global Object.prototype, it can compromise the integrity and confidentiality of applications by enabling authentication bypass and unauthorized access. The persistence of the pollution throughout the Node.js process lifetime means that all objects can be affected, potentially destabilizing application logic and causing denial of service. In worst-case scenarios, attackers may chain this vulnerability with others to achieve remote code execution, leading to full system compromise. This poses a critical risk to web services, APIs, and backend systems that depend on orpc for API construction and communication. The vulnerability's remote and unauthenticated nature increases the attack surface, making it a prime target for attackers seeking to exploit API infrastructures. Organizations that fail to patch may face data breaches, service outages, and reputational damage.
Mitigation Recommendations
To mitigate CVE-2026-28794, organizations should immediately upgrade the @orpc/client package to version 1.13.6 or later, where the vulnerability has been patched. Beyond upgrading, developers should implement strict input validation and sanitization on all JSON payloads processed by RPC deserializers to prevent injection of malicious properties. Employ runtime security monitoring to detect unusual prototype modifications or anomalous object behaviors indicative of prototype pollution attacks. Use security linters and static analysis tools to identify unsafe object property assignments in codebases. Limit the privileges of Node.js processes running orpc-based services to reduce the impact of potential exploitation. Additionally, consider implementing application-layer firewalls or API gateways that can filter and block suspicious payloads targeting prototype pollution vectors. Regularly audit dependencies for known vulnerabilities and maintain an up-to-date inventory of packages to ensure timely patching.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, India
CVE-2026-28794: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in middleapi orpc
Description
CVE-2026-28794 is a critical prototype pollution vulnerability in the @orpc/client package of the middleapi orpc tool, affecting versions prior to 1. 13. 6. The flaw allows unauthenticated remote attackers to inject arbitrary properties into the global Object. prototype via the RPC JSON deserializer. This pollution persists for the lifetime of the Node. js process, impacting all objects and potentially enabling severe security breaches such as authentication bypass, denial of service, and remote code execution. The vulnerability requires no authentication or user interaction and has a CVSS 4. 0 score of 9. 3, indicating critical severity.
AI-Powered Analysis
Technical Analysis
CVE-2026-28794 is a prototype pollution vulnerability classified under CWE-1321, found in the RPC JSON deserializer component of the @orpc/client package within the middleapi orpc tool. The orpc tool facilitates building APIs that are end-to-end type-safe and compliant with OpenAPI standards. Versions prior to 1.13.6 allow unauthenticated remote attackers to manipulate the global Object.prototype by injecting arbitrary properties through crafted JSON payloads. Prototype pollution occurs when an attacker modifies the prototype of a base object, causing all objects inheriting from it to inherit malicious or unexpected properties. In Node.js environments, this pollution persists for the entire process lifetime, affecting all objects and potentially leading to severe consequences such as bypassing authentication mechanisms, causing denial of service by corrupting application logic, or even enabling remote code execution if exploited in conjunction with other vulnerabilities. The vulnerability is remotely exploitable without any authentication or user interaction, making it highly dangerous. The issue was publicly disclosed and assigned a CVSS 4.0 score of 9.3, reflecting its critical impact on confidentiality, integrity, and availability. The vulnerability has been fixed in version 1.13.6 of the @orpc/client package, and users are strongly advised to upgrade. No known active exploits have been reported yet, but the ease of exploitation and potential impact make this a high-priority patch.
Potential Impact
The impact of CVE-2026-28794 is significant for organizations using the middleapi orpc tool, especially those relying on the @orpc/client package versions prior to 1.13.6. Because the vulnerability allows unauthenticated remote attackers to inject properties into the global Object.prototype, it can compromise the integrity and confidentiality of applications by enabling authentication bypass and unauthorized access. The persistence of the pollution throughout the Node.js process lifetime means that all objects can be affected, potentially destabilizing application logic and causing denial of service. In worst-case scenarios, attackers may chain this vulnerability with others to achieve remote code execution, leading to full system compromise. This poses a critical risk to web services, APIs, and backend systems that depend on orpc for API construction and communication. The vulnerability's remote and unauthenticated nature increases the attack surface, making it a prime target for attackers seeking to exploit API infrastructures. Organizations that fail to patch may face data breaches, service outages, and reputational damage.
Mitigation Recommendations
To mitigate CVE-2026-28794, organizations should immediately upgrade the @orpc/client package to version 1.13.6 or later, where the vulnerability has been patched. Beyond upgrading, developers should implement strict input validation and sanitization on all JSON payloads processed by RPC deserializers to prevent injection of malicious properties. Employ runtime security monitoring to detect unusual prototype modifications or anomalous object behaviors indicative of prototype pollution attacks. Use security linters and static analysis tools to identify unsafe object property assignments in codebases. Limit the privileges of Node.js processes running orpc-based services to reduce the impact of potential exploitation. Additionally, consider implementing application-layer firewalls or API gateways that can filter and block suspicious payloads targeting prototype pollution vectors. Regularly audit dependencies for known vulnerabilities and maintain an up-to-date inventory of packages to ensure timely patching.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-03T14:25:19.245Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69aa6319c48b3f10ff135409
Added to database: 3/6/2026, 5:16:09 AM
Last enriched: 3/6/2026, 5:30:21 AM
Last updated: 3/6/2026, 7:25:17 AM
Views: 84
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.