๐Ÿ” CVE Alert

CVE-2026-42077

MEDIUM 5.2

Evolver: Prototype Pollution via `Object.assign()` in mailbox store operations

CVSS Score
5.2
EPSS Score
0.0%
EPSS Percentile
0th

Evolver is a GEP-powered self-evolving engine for AI agents. Prior to version 1.69.3, a prototype pollution vulnerability in the mailbox store module allows attackers to modify the behavior of all JavaScript objects by injecting malicious properties into Object.prototype. The vulnerability exists in the _applyUpdate() and _updateRecord() functions which use Object.assign() to merge user-controlled data without filtering dangerous keys like __proto__, constructor, or prototype. This issue has been patched in version 1.69.3.

CWE CWE-1321
Vendor evomap
Product evolver
Published May 4, 2026
Stay Ahead of the Next One

Get instant alerts for evomap evolver

Be the first to know when new medium vulnerabilities affecting evomap evolver are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
High

Affected Versions

EvoMap / evolver
< 1.69.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/EvoMap/evolver/security/advisories/GHSA-2cjr-5v3h-v2w4 github.com: https://github.com/EvoMap/evolver/releases/tag/v1.69.3