#VU118878 Prototype pollution in Express - CVE-2024-51999
Published: December 1, 2025
Express
Express.js
Description
The vulnerability allows a remote attacker to execute arbitrary JavaScript code.
The vulnerability exists due to improper input validation when using the extended query parser in express ('query parser': 'extended'). A remote attacker can pass specially crafted input to the application and perform prototype pollution, which can result in information disclosure or data manipulation.