Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mh29-5h37-fv8m | js-yaml has prototype pollution in merge (<<) |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 22 Jan 2026 00:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 16 Dec 2025 09:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 03 Dec 2025 04:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nodeca
Nodeca js-yaml |
|
| CPEs | cpe:2.3:a:nodeca:js-yaml:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Nodeca
Nodeca js-yaml |
Fri, 14 Nov 2025 18:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Js-yaml
Js-yaml js-yaml |
|
| Vendors & Products |
Js-yaml
Js-yaml js-yaml |
Fri, 14 Nov 2025 02:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 14 Nov 2025 00:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | js-yaml is a JavaScript YAML parser and dumper. In js-yaml 4.1.0 and below, it's possible for an attacker to modify the prototype of the result of a parsed yaml document via prototype pollution (`__proto__`). All users who parse untrusted yaml documents may be impacted. The problem is patched in js-yaml 4.1.1. Users can protect against this kind of attack on the server by using `node --disable-proto=delete` or `deno` (in Deno, pollution protection is on by default). | |
| Title | js-yaml has prototype pollution in merge (<<) | |
| Weaknesses | CWE-1321 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-21T14:38:16.644Z
Reserved: 2025-11-10T14:07:42.922Z
Link: CVE-2025-64718
Updated: 2026-01-21T14:38:16.644Z
Status : Modified
Published: 2025-11-13T16:15:57.153
Modified: 2026-01-21T15:16:07.633
Link: CVE-2025-64718
OpenCVE Enrichment
Updated: 2025-11-14T18:28:09Z
Github GHSA