| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4mph-v827-f877 | Locutus has Prototype Pollution via __proto__ Key Injection in unserialize() |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 30 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-915 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 30 Mar 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Locutus
Locutus locutus |
|
| Vendors & Products |
Locutus
Locutus locutus |
Sat, 28 Mar 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to version 3.0.25, the `unserialize()` function in `locutus/php/var/unserialize` assigns deserialized keys to plain objects via bracket notation without filtering the `__proto__` key. When a PHP serialized payload contains `__proto__` as an array or object key, JavaScript's `__proto__` setter is invoked, replacing the deserialized object's prototype with attacker-controlled content. This enables property injection, for...in propagation of injected properties, and denial of service via built-in method override. This is distinct from the previously reported prototype pollution in `parse_str` (GHSA-f98m-q3hr-p5wq, GHSA-rxrv-835q-v5mh) — `unserialize` is a different function with no mitigation applied. Version 3.0.25 patches the issue. | |
| Title | Locutus has Prototype Pollution via __proto__ Key Injection in unserialize() | |
| Weaknesses | CWE-1321 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-30T15:45:18.660Z
Reserved: 2026-03-24T22:20:06.212Z
Link: CVE-2026-33993
Updated: 2026-03-30T15:45:13.571Z
Status : Awaiting Analysis
Published: 2026-03-27T23:17:14.237
Modified: 2026-03-30T13:26:07.647
Link: CVE-2026-33993
OpenCVE Enrichment
Updated: 2026-03-30T07:59:13Z
Github GHSA