Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. querymen
  4. ›
  5. CVE-2022-25871

CVE-2022-25871: Prototype Pollution in querymen

June 17, 2022 (updated June 28, 2022)

All versions of package querymen is vulnerable to Prototype Pollution if the parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. Note: This vulnerability derives from an incomplete fix of CVE-2020-7600.

References

  • github.com/advisories/GHSA-p23c-p8w2-ww5v
  • nvd.nist.gov/vuln/detail/CVE-2022-25871
  • snyk.io/vuln/SNYK-JS-QUERYMEN-2391488

Code Behaviors & Features

Detect and mitigate CVE-2022-25871 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 2.1.4

Solution

Unfortunately, there is no solution available yet.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

Source file

npm/querymen/CVE-2022-25871.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:41 +0000.