CVE-2022-37257
JavaScript vulnerability analysis and mitigation

Overview

A prototype pollution vulnerability was discovered in stealjs steal version 2.2.4. The vulnerability exists in the convertLater function within npm-convert.js and can be exploited via the requestedVersion variable (GitHub Issue).

Technical details

The vulnerability is located in the npm-convert.js file of the stealjs steal package. The issue occurs in the convertLater function where improper handling of the requestedVersion variable can lead to prototype pollution. This allows an attacker to modify the prototype chain of objects, potentially leading to application security issues (GitHub Source).

Impact

Successful exploitation of this vulnerability could allow an attacker to modify object prototypes, which can lead to application security issues such as denial of service (DoS) or potentially remote code execution depending on how the affected objects are used in the application (CVE Mitre).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23744CRITICAL9.8
  • JavaScriptJavaScript
  • @mcpjam/inspector
NoYesJan 16, 2026
CVE-2026-23735HIGH8.7
  • JavaScriptJavaScript
  • graphql-modules
NoYesJan 16, 2026
GHSA-gw32-9rmw-qwwwHIGH8.4
  • JavaScriptJavaScript
  • svelte
NoYesJan 16, 2026
CVE-2026-23745HIGH8.2
  • JavaScriptJavaScript
  • tar
NoYesJan 16, 2026
GHSA-38cw-85xc-xr9xMEDIUM6.8
  • JavaScriptJavaScript
  • @veramo/data-store
NoYesJan 16, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management