HomeDottie ProjectCVE-2026-27837

CVE-2026-27837

MEDIUM
6.3CVSS
Published: 2026-02-26
Updated: 2026-02-28
AI Analysis

Description

Dottie provides nested object access and manipulation in JavaScript. Versions 2.0.4 through 2.0.6 contain an incomplete fix for CVE-2023-26132. The prototype pollution guard introduced in commit `7d3aee1` only validates the first segment of a dot-separated path, allowing an attacker to bypass the protection by placing `__proto__` at any position other than the first. Both `dottie.set()` and `dottie.transform()` are affected. Version 2.0.7 contains an updated fix to address the residual vulnerability.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Attack Vector
network
Complexity
low
Privileges
none
User Action
required
Scope
unchanged
Confidentiality
low
Integrity
low
Availability
low
Weaknesses
CWE-1321

Metadata

Primary Vendor
DOTTIE_PROJECT
Published
2/26/2026
Last Modified
2/28/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

dottie_project : dottie

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-27837 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com