Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Prototype Pollution via the jsondiffpatch.patch() and jsondiffpatch/formatters/jsonpatch.patch() APIs. An attacker can perform prototype pollution by supplying crafted delta or JSON Patch documents, as attacker-controlled property names and path segments are used to traverse and modify objects without restricting access to special properties like __proto__ or constructor.prototype, allowing modification of Object.prototype.
https://security.snyk.io/vuln/SNYK-JS-JSONDIFFPATCH-16322990
https://github.com/benjamine/jsondiffpatch/commit/381c0125efab49f6f0dbc08317d01d55717672af
https://gist.github.com/yuki-matsuhashi/e570fb1579ae1f3190059b622b0473fb
Published: 2026-05-16
Updated: 2026-05-16
Base Score: 8.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:C/A:P
Severity: High
Base Score: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
Severity: High
Base Score: 8.8
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
Severity: High
EPSS: 0.0005