Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28794: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in middleapi orpc

0
Critical
VulnerabilityCVE-2026-28794cvecve-2026-28794cwe-1321
Published: Fri Mar 06 2026 (03/06/2026, 05:02:19 UTC)
Source: CVE Database V5
Vendor/Project: middleapi
Product: orpc

Description

CVE-2026-28794 is a critical prototype pollution vulnerability in the @orpc/client package of the middleapi orpc tool, affecting versions prior to 1. 13. 6. The flaw allows unauthenticated remote attackers to inject arbitrary properties into the global Object. prototype via the RPC JSON deserializer. This pollution persists for the lifetime of the Node. js process, impacting all objects and potentially enabling severe security breaches such as authentication bypass, denial of service, and remote code execution. The vulnerability requires no authentication or user interaction and has a CVSS 4. 0 score of 9. 3, indicating critical severity.

AI-Powered Analysis

AILast updated: 03/06/2026, 05:30:21 UTC

Technical Analysis

CVE-2026-28794 is a prototype pollution vulnerability classified under CWE-1321, found in the RPC JSON deserializer component of the @orpc/client package within the middleapi orpc tool. The orpc tool facilitates building APIs that are end-to-end type-safe and compliant with OpenAPI standards. Versions prior to 1.13.6 allow unauthenticated remote attackers to manipulate the global Object.prototype by injecting arbitrary properties through crafted JSON payloads. Prototype pollution occurs when an attacker modifies the prototype of a base object, causing all objects inheriting from it to inherit malicious or unexpected properties. In Node.js environments, this pollution persists for the entire process lifetime, affecting all objects and potentially leading to severe consequences such as bypassing authentication mechanisms, causing denial of service by corrupting application logic, or even enabling remote code execution if exploited in conjunction with other vulnerabilities. The vulnerability is remotely exploitable without any authentication or user interaction, making it highly dangerous. The issue was publicly disclosed and assigned a CVSS 4.0 score of 9.3, reflecting its critical impact on confidentiality, integrity, and availability. The vulnerability has been fixed in version 1.13.6 of the @orpc/client package, and users are strongly advised to upgrade. No known active exploits have been reported yet, but the ease of exploitation and potential impact make this a high-priority patch.

Potential Impact

The impact of CVE-2026-28794 is significant for organizations using the middleapi orpc tool, especially those relying on the @orpc/client package versions prior to 1.13.6. Because the vulnerability allows unauthenticated remote attackers to inject properties into the global Object.prototype, it can compromise the integrity and confidentiality of applications by enabling authentication bypass and unauthorized access. The persistence of the pollution throughout the Node.js process lifetime means that all objects can be affected, potentially destabilizing application logic and causing denial of service. In worst-case scenarios, attackers may chain this vulnerability with others to achieve remote code execution, leading to full system compromise. This poses a critical risk to web services, APIs, and backend systems that depend on orpc for API construction and communication. The vulnerability's remote and unauthenticated nature increases the attack surface, making it a prime target for attackers seeking to exploit API infrastructures. Organizations that fail to patch may face data breaches, service outages, and reputational damage.

Mitigation Recommendations

To mitigate CVE-2026-28794, organizations should immediately upgrade the @orpc/client package to version 1.13.6 or later, where the vulnerability has been patched. Beyond upgrading, developers should implement strict input validation and sanitization on all JSON payloads processed by RPC deserializers to prevent injection of malicious properties. Employ runtime security monitoring to detect unusual prototype modifications or anomalous object behaviors indicative of prototype pollution attacks. Use security linters and static analysis tools to identify unsafe object property assignments in codebases. Limit the privileges of Node.js processes running orpc-based services to reduce the impact of potential exploitation. Additionally, consider implementing application-layer firewalls or API gateways that can filter and block suspicious payloads targeting prototype pollution vectors. Regularly audit dependencies for known vulnerabilities and maintain an up-to-date inventory of packages to ensure timely patching.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-03T14:25:19.245Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69aa6319c48b3f10ff135409

Added to database: 3/6/2026, 5:16:09 AM

Last enriched: 3/6/2026, 5:30:21 AM

Last updated: 3/6/2026, 7:25:17 AM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses