@std/toml is the Deno Standard Library. Prior to version 1.0.9, an attacker can pollute the prototype chain in Node.js runtime and Browser when parsing untrusted TOML data, thus achieving Prototype Pollution (PP) vulnerability. This is because the library is merging an untrusted object with an empty object, which by default the empty object has the prototype chain. This issue has been patched in version 1.0.9.
Metrics
Affected Vendors & Products
References
History
Sat, 16 Aug 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Denoland
Denoland std |
|
Vendors & Products |
Denoland
Denoland std |
Thu, 14 Aug 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 14 Aug 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | @std/toml is the Deno Standard Library. Prior to version 1.0.9, an attacker can pollute the prototype chain in Node.js runtime and Browser when parsing untrusted TOML data, thus achieving Prototype Pollution (PP) vulnerability. This is because the library is merging an untrusted object with an empty object, which by default the empty object has the prototype chain. This issue has been patched in version 1.0.9. | |
Title | @std/toml Prototype Pollution in Node.js and Browser | |
Weaknesses | CWE-1321 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-08-14T16:39:28.158Z
Updated: 2025-08-14T19:18:25.234Z
Reserved: 2025-08-08T21:55:07.964Z
Link: CVE-2025-55195

Updated: 2025-08-14T18:36:16.855Z

Status : Awaiting Analysis
Published: 2025-08-14T17:15:41.330
Modified: 2025-08-15T13:12:51.217
Link: CVE-2025-55195

No data.