{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-41714","assignerOrgId":"84fe0718-d6bb-4716-a7e8-81a6d1daa869","assignerShortName":"Fluid Attacks","dateUpdated":"2025-12-03T19:58:57.437Z","dateReserved":"2022-09-28T00:00:00.000Z","datePublished":"2022-11-03T00:00:00.000Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://www.npmjs.com/","defaultStatus":"unaffected","packageName":"fastest-json-copy","product":"fastest-json-copy","vendor":"n/a","versions":[{"status":"affected","version":"1.0.1"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>fastest-json-copy version 1.0.1 allows an external attacker to edit or add new properties to an object. This is possible because the application does not correctly validate the incoming JSON keys, thus allowing the '__proto__' property to be edited.</p>"}],"value":"fastest-json-copy version 1.0.1 allows an external attacker to edit or add new properties to an object. This is possible because the application does not correctly validate the incoming JSON keys, thus allowing the '__proto__' property to be edited."}],"problemTypes":[{"descriptions":[{"description":"Prototype Pollution","lang":"en"}]}],"providerMetadata":{"orgId":"84fe0718-d6bb-4716-a7e8-81a6d1daa869","shortName":"Fluid Attacks","dateUpdated":"2025-12-03T19:58:57.437Z"},"references":[{"url":"https://fluidattacks.com/advisories/guetta/"},{"url":"https://github.com/streamich/fastest-json-copy"}],"source":{"discovery":"UNKNOWN"},"title":"fastest-json-copy 1.0.1 - Prototype Pollution","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T12:49:44.011Z"},"title":"CVE Program Container","references":[{"url":"https://fluidattacks.com/advisories/guetta/","tags":["x_transferred"]},{"url":"https://github.com/streamich/fastest-json-copy","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-1321","lang":"en","description":"CWE-1321 Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.3,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","integrityImpact":"LOW","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-05-05T13:21:45.701824Z","id":"CVE-2022-41714","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-05T13:22:29.671Z"}}]}}