Vulnerability Description
seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0 and below, due to improper input validation, a malicious object key can lead to prototype pollution during JSON deserialization. This vulnerability affects only JSON deserialization functionality. This issue is fixed in version 1.4.1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lxsmnsyc | Seroval | < 1.4.1 |
Related Weaknesses (CWE)
References
- https://github.com/lxsmnsyc/seroval/commit/ce9408ebc87312fcad345a73c172212f2a798Patch
- https://github.com/lxsmnsyc/seroval/security/advisories/GHSA-hj76-42vx-jwp4Vendor Advisory
FAQ
What is CVE-2026-23736?
CVE-2026-23736 is a vulnerability with a CVSS score of 7.3 (HIGH). seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0 and below, due to improper input validation, a malicious object key can...
How severe is CVE-2026-23736?
CVE-2026-23736 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-23736?
Check the references section above for vendor advisories and patch information. Affected products include: Lxsmnsyc Seroval.