#VU86374 Prototype pollution in plotly.js - CVE-2023-46308
Published: February 13, 2024
plotly.js
plotly
Description
The vulnerability allows a remote attacker to execute arbitrary JavaScript code.
The vulnerability exists due to plot API calls have a risk of __proto__ being polluted in expandObjectPaths or nestedProperty. A remote attacker can pass specially crafted input to the application and perform prototype pollution, which can result in information disclosure or data manipulation.