CVE-2021-23518
JavaScript vulnerability analysis and mitigation

Overview

The cached-path-relative package versions before 1.1.0 contain a Prototype Pollution vulnerability (CVE-2021-23518). The vulnerability exists in the cachedPathRelative function where the cache variable is set as {} instead of Object.create(null), allowing access to parent prototype properties when the object is used to create the cached relative path. This vulnerability is particularly notable as it stems from an incomplete fix of a previous security issue (Snyk Advisory).

Technical details

The vulnerability occurs when using the origin path as proto, causing the attribute of the object to be accessed instead of a path. The issue has received a CVSS v3.1 Base Score of 9.8 (CRITICAL) from NVD and 7.3 (HIGH) from Snyk. The vulnerability is classified under CWE-1321 (Improperly Controlled Modification of Object Prototype Attributes) (NVD).

Impact

When exploited, this Prototype Pollution vulnerability can lead to denial of service by triggering JavaScript exceptions or potentially enable code path manipulation leading to remote code execution. The attacker can manipulate object prototype attributes to overwrite or pollute JavaScript application object prototypes (Snyk Advisory).

Mitigation and workarounds

The vulnerability has been fixed in version 1.1.0 of the cached-path-relative package. The fix involves using Object.create(null) instead of {} for cache initialization. Users should upgrade to version 1.1.0 or higher to address this security issue (GitHub Patch).

Community reactions

The vulnerability has been acknowledged and addressed by multiple organizations. Debian included this fix in their security updates (DLA 3221-1), demonstrating the widespread impact of this security issue (Debian Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67731HIGH8.7
  • JavaScriptJavaScript
  • servify-express
NoYesDec 12, 2025
CVE-2025-67718HIGH8.7
  • JavaScriptJavaScript
  • formio
NoYesDec 11, 2025
CVE-2025-8083HIGH8.6
  • JavaScriptJavaScript
  • vuetify
NoYesDec 12, 2025
CVE-2025-67750HIGH8.4
  • JavaScriptJavaScript
  • lightning-flow-scanner
NoYesDec 12, 2025
CVE-2025-8082MEDIUM6.3
  • JavaScriptJavaScript
  • vuetify
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management