Generated remediation guidance and an executive summary. No account required.
"protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.5 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty.
Cite this page
CVE-2023-36665. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2023-36665
Use CWE-1321, Protobufjs Project vendor hub and Protobufjs product page to widen CVE-2023-36665 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-41242, CVE-2022-25878 and CVE-2018-3738 for nearby disclosures in the same product family.