{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-0842","assignerOrgId":"84fe0718-d6bb-4716-a7e8-81a6d1daa869","assignerShortName":"Fluid Attacks","dateUpdated":"2025-12-03T20:14:55.512Z","dateReserved":"2023-02-15T00:00:00.000Z","datePublished":"2023-04-05T00:00:00.000Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://registry.npmjs.org","defaultStatus":"unaffected","packageName":"node-xml2js","product":"xml2js","vendor":"n/a","versions":[{"status":"affected","version":"0.4.23"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>xml2js version 0.4.23 allows an external attacker to edit or add new properties to an object. This is possible because the application does not properly validate incoming JSON keys, thus allowing the __proto__ property to be edited.</p>"}],"value":"xml2js version 0.4.23 allows an external attacker to edit or add new properties to an object. This is possible because the application does not properly validate incoming JSON keys, thus allowing the __proto__ property to be edited."}],"problemTypes":[{"descriptions":[{"description":"Prototype Pollution","lang":"en"}]}],"providerMetadata":{"orgId":"84fe0718-d6bb-4716-a7e8-81a6d1daa869","shortName":"Fluid Attacks","dateUpdated":"2025-12-03T20:14:55.512Z"},"references":[{"tags":["third-party-advisory"],"url":"https://fluidattacks.com/advisories/myers/"},{"tags":["product"],"url":"https://github.com/Leonidas-from-XIV/node-xml2js/"},{"name":"[debian-lts-announce] 20240314 [SECURITY] [DLA 3760-1] node-xml2js security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00013.html"},{"tags":["patch"],"url":"https://github.com/Leonidas-from-XIV/node-xml2js/releases/tag/0.6.2"}],"source":{"discovery":"UNKNOWN"},"title":"xml2js 0.4.23 - Prototype Pollution","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:24:34.583Z"},"title":"CVE Program Container","references":[{"url":"https://fluidattacks.com/advisories/myers/","tags":["x_transferred"]},{"url":"https://github.com/Leonidas-from-XIV/node-xml2js/","tags":["x_transferred"]},{"name":"[debian-lts-announce] 20240314 [SECURITY] [DLA 3760-1] node-xml2js security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2024/03/msg00013.html"}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-1321","lang":"en","description":"CWE-1321 Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.3,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","integrityImpact":"LOW","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-02-13T19:12:29.183636Z","id":"CVE-2023-0842","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-13T19:13:03.902Z"}}]}}