
Cloud Vulnerability DB
A community-led vulnerabilities database
The latest version of utils-extend (1.0.8) contains a Prototype Pollution vulnerability through the entry function lib.extend. This vulnerability was assigned CVE-2024-57077 and was disclosed on February 5, 2025 (MITRE CVE, NVD).
The vulnerability exists in the lib.extend function of utils-extend package. An attacker can exploit this by supplying a payload with Object.prototype setter to introduce or modify properties within the global prototype chain. The vulnerability stems from improper input validation when handling object properties (GitHub PoC).
The primary impact is denial of service (DoS) as a minimum consequence. However, the vulnerability can potentially escalate to other injection-based attacks. If the polluted property propagates to sensitive Node.js APIs (such as exec or eval), it could enable an attacker to execute arbitrary commands within the application's context (GitHub PoC).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."