CVE-2021-23497
JavaScript vulnerability analysis and mitigation

Overview

The vulnerability (CVE-2021-23497) affects the @strikeentco/set package versions before 1.0.2. This is a prototype pollution vulnerability that allows an attacker to cause a denial of service and may lead to remote code execution. The vulnerability was discovered as a result of an incomplete fix for a previous vulnerability (SNYK-JS-STRIKEENTCOSET-1038821). The issue was disclosed on January 27, 2022 and published on January 31, 2022 (SNYK Advisory).

Technical details

The vulnerability is a prototype pollution issue that occurs due to improper validation of input types. The original fix checked for dangerous properties using strict equality (===) operator, but this could be bypassed by wrapping the dangerous key in an array. For example, while the code would block 'proto' as a string, it would allow ['proto'] to pass through, leading to prototype pollution. The vulnerability has a CVSS v3.1 base score of 9.8 (CRITICAL) according to NVD, while Snyk rates it at 7.5 (HIGH) (NVD).

Impact

The vulnerability can be exploited to cause denial of service conditions and potentially achieve remote code execution. Through prototype pollution, an attacker can modify JavaScript language construct prototypes, affecting all objects that inherit from the polluted prototype. This can lead to application crashes or manipulation of application behavior (SNYK Advisory).

Mitigation and workarounds

The vulnerability was fixed in version 1.0.2 of the @strikeentco/set package. The fix involves converting path components to strings before validation if they are not of string or number type. Users should upgrade to version 1.0.2 or higher to address this vulnerability (Github Commit).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67731HIGH8.7
  • JavaScriptJavaScript
  • servify-express
NoYesDec 12, 2025
CVE-2025-67718HIGH8.7
  • JavaScriptJavaScript
  • formio
NoYesDec 11, 2025
CVE-2025-8083HIGH8.6
  • JavaScriptJavaScript
  • vuetify
NoYesDec 12, 2025
CVE-2025-67750HIGH8.4
  • JavaScriptJavaScript
  • lightning-flow-scanner
NoYesDec 12, 2025
CVE-2025-8082MEDIUM6.3
  • JavaScriptJavaScript
  • vuetify
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management