CVE-2026-33228
JavaScript vulnerability analysis and mitigation

flatted is a circular JSON parser. Prior to version 3.4.2, the parse() function in flatted can use attacker-controlled string values from the parsed JSON as direct array index keys, without validating that they are numeric. Since the internal input buffer is a JavaScript Array, accessing it with the key "proto" returns Array.prototype via the inherited getter. This object is then treated as a legitimate parsed value and assigned as a property of the output object, effectively leaking a live reference to Array.prototype to the consumer. Any code that subsequently writes to that property will pollute the global prototype. This issue has been patched in version 3.4.2.

Wiz Threat Research note: This vulnerability's initial access potential has been overridden to FALSE by the Wiz Research team, as it does not allow RCE on its own.


SourceNVD

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-p6x5-p4xf-cc4rCRITICAL9.8
  • JavaScriptJavaScript
  • math-codegen
NoYesApr 17, 2026
CVE-2026-41242CRITICAL9.4
  • JavaScriptJavaScript
  • protobufjs
NoYesApr 18, 2026
GHSA-v38x-c887-992fCRITICAL9.2
  • JavaScriptJavaScript
  • flowise
NoYesApr 18, 2026
CVE-2026-40931HIGH8.4
  • JavaScriptJavaScript
  • compressing
NoYesApr 17, 2026
CVE-2026-40346MEDIUM6.4
  • JavaScriptJavaScript
  • @nocobase/plugin-workflow-request
NoYesApr 18, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management