Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
9.8
Dottie versions 2.0.4 to 2.0.6: Unfixed Prototype Pollution
DEBIAN-CVE-2026-27837
Summary
Versions 2.0.4 to 2.0.6 of Dottie are vulnerable to a type of attack that can manipulate data. This means an attacker could potentially change data in unexpected ways, which can lead to security issues. Update to version 2.0.7 to fix this issue.
What to do
- Update debian node-dottie to version 2.0.7+~2.0.7-1.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| debian | node-dottie | All versions | – |
| debian | node-dottie | All versions | – |
| debian | node-dottie | All versions | – |
| debian | node-dottie | <= 2.0.7+~2.0.7-1 | 2.0.7+~2.0.7-1 |
Original title
Dottie provides nested object access and manipulation in JavaScript. Versions 2.0.4 through 2.0.6 contain an incomplete fix for CVE-2023-26132. The prototype pollution guard introduced in commit `7...
Original description
Dottie provides nested object access and manipulation in JavaScript. Versions 2.0.4 through 2.0.6 contain an incomplete fix for CVE-2023-26132. The prototype pollution guard introduced in commit `7d3aee1` only validates the first segment of a dot-separated path, allowing an attacker to bypass the protection by placing `__proto__` at any position other than the first. Both `dottie.set()` and `dottie.transform()` are affected. Version 2.0.7 contains an updated fix to address the residual vulnerability.
osv CVSS3.1
9.8
- https://security-tracker.debian.org/tracker/CVE-2026-27837 Vendor Advisory
Published: 26 Feb 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026