Vulnerability Description
Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. In versions from 2.0.12 to before 2.0.39, a prototype pollution vulnerability exists in locutus. Despite a previous fix that attempted to mitigate prototype pollution by checking whether user input contained a forbidden key, it is still possible to pollute Object.prototype via a crafted input using String.prototype. This issue has been patched in version 2.0.39.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Locutus | Locutus | >= 2.0.12, < 2.0.39 |
Related Weaknesses (CWE)
References
- https://github.com/locutusjs/locutus/commit/042af9ca7fde2ff599120783e720a17f335bPatch
- https://github.com/locutusjs/locutus/security/advisories/GHSA-rxrv-835q-v5mhExploitVendor Advisory
FAQ
What is CVE-2026-25521?
CVE-2026-25521 is a vulnerability with a CVSS score of 8.8 (HIGH). Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. In versions from 2.0.12 to before 2.0.39, a prototype pollution vulnerability exists in locutus. Despite a...
How severe is CVE-2026-25521?
CVE-2026-25521 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-25521?
Check the references section above for vendor advisories and patch information. Affected products include: Locutus Locutus.