๐Ÿ” CVE Alert

CVE-2026-27837

MEDIUM 6.3

Dottie vulnerable to prototype pollution bypass via non-first path segments in set() and transform()

CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
0th

Dottie provides nested object access and manipulation in JavaScript. Versions 2.0.4 through 2.0.6 contain an incomplete fix for CVE-2023-26132. The prototype pollution guard introduced in commit `7d3aee1` only validates the first segment of a dot-separated path, allowing an attacker to bypass the protection by placing `__proto__` at any position other than the first. Both `dottie.set()` and `dottie.transform()` are affected. Version 2.0.7 contains an updated fix to address the residual vulnerability.

CWE CWE-1321
Vendor mickhansen
Product dottie.js
Published Feb 26, 2026
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for mickhansen dottie.js

Be the first to know when new medium vulnerabilities affecting mickhansen dottie.js are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Affected Versions

mickhansen / dottie.js
>= 2.0.4, < 2.0.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/mickhansen/dottie.js/security/advisories/GHSA-r5mx-6wc6-7h9w github.com: https://github.com/mickhansen/dottie.js/commit/7e8fa1345a4b46325f0eab8d7aeb1c4deaefdb14 github.com: https://github.com/advisories/GHSA-4gxf-g5gf-22h4