#VU96657 Prototype pollution in rangy - CVE-2023-26102
Published: September 2, 2024 / Updated: November 6, 2024
rangy
timdown
Description
The vulnerability allows a remote attacker to execute arbitrary JavaScript code.
The vulnerability exists due to improper input validation in extend() function in file rangy-core.js. A remote attacker can pass specially crafted input to the application and perform prototype pollution, which can result in information disclosure or data manipulation.