Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
9.8

Dottie versions 2.0.4 to 2.0.6: Unfixed Prototype Pollution

DEBIAN-CVE-2026-27837
Summary

Versions 2.0.4 to 2.0.6 of Dottie are vulnerable to a type of attack that can manipulate data. This means an attacker could potentially change data in unexpected ways, which can lead to security issues. Update to version 2.0.7 to fix this issue.

What to do
  • Update debian node-dottie to version 2.0.7+~2.0.7-1.
Affected software
VendorProductAffected versionsFix available
debian node-dottie All versions
debian node-dottie All versions
debian node-dottie All versions
debian node-dottie <= 2.0.7+~2.0.7-1 2.0.7+~2.0.7-1
Original title
Dottie provides nested object access and manipulation in JavaScript. Versions 2.0.4 through 2.0.6 contain an incomplete fix for CVE-2023-26132. The prototype pollution guard introduced in commit `7...
Original description
Dottie provides nested object access and manipulation in JavaScript. Versions 2.0.4 through 2.0.6 contain an incomplete fix for CVE-2023-26132. The prototype pollution guard introduced in commit `7d3aee1` only validates the first segment of a dot-separated path, allowing an attacker to bypass the protection by placing `__proto__` at any position other than the first. Both `dottie.set()` and `dottie.transform()` are affected. Version 2.0.7 contains an updated fix to address the residual vulnerability.
osv CVSS3.1 9.8
Published: 26 Feb 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026