seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0 and below, due to improper input validation, a malicious object key can lead to prototype pollution during JSON deserialization. This vulnerability affects only JSON deserialization functionality. This issue is fixed in version 1.4.1.
History

Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Lxsmnsyc
Lxsmnsyc seroval
Vendors & Products Lxsmnsyc
Lxsmnsyc seroval

Thu, 22 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 22 Jan 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Wed, 21 Jan 2026 23:15:00 +0000

Type Values Removed Values Added
Description seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0 and below, due to improper input validation, a malicious object key can lead to prototype pollution during JSON deserialization. This vulnerability affects only JSON deserialization functionality. This issue is fixed in version 1.4.1.
Title seroval Affected by Prototype Pollution via JSON Deserialization
Weaknesses CWE-1321
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-01-21T23:01:10.114Z

Updated: 2026-01-22T14:45:53.950Z

Reserved: 2026-01-15T15:45:01.957Z

Link: CVE-2026-23736

cve-icon Vulnrichment

Updated: 2026-01-22T14:45:51.268Z

cve-icon NVD

Status : Received

Published: 2026-01-21T23:15:52.340

Modified: 2026-01-21T23:15:52.340

Link: CVE-2026-23736

cve-icon Redhat

Severity : Important

Publid Date: 2026-01-21T23:01:10Z

Links: CVE-2026-23736 - Bugzilla