CVE-2026-33228 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: March 23, 2026
flatted - Prototype Pollution
Overview
flatted < 3.4.2 contains a prototype pollution caused by improper validation of array index keys in parse() function, letting attackers leak and modify Array.prototype, exploit requires crafted JSON input.
Severity & Score
Impact
Attackers can pollute the global prototype, leading to potential application logic corruption or security bypass.
Mitigation
Update to version 3.4.2 or later.
References
Social Media Activity(1 post)
š“ CVE-2026-33228 - Critical (9.8) flatted is a circular JSON parser. Prior to version 3.4.2, the parse() function in flatted can use attacker-controlled string values from the parsed JSON as direct array index keys, without validating that they are numeric. Since the internal inpu... š https://www.thehackerwire.com/vulnerability/CVE-2026-33228/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-33228
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- prototype_pollution
- Status
- confirmed
- EPSS
- 2.5%
- Social Posts
- 1
CWE
- CWE-1321
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H