#VU98525 Prototype pollution in uPlot - CVE-2024-21489
Published: October 14, 2024
uPlot
Leon Sorokin
Description
The vulnerability allows a remote attacker to execute arbitrary JavaScript code.
The vulnerability exists due to improper input validation within the uplot.assign() function. A remote attacker can pass specially crafted input to the application and perform prototype pollution, which can result in information disclosure or data manipulation.