High severity7.3NVD Advisory· Published Apr 4, 2025· Updated Apr 29, 2026
CVE-2025-3197
CVE-2025-3197
Description
Versions of the package expand-object from 0.0.0 are vulnerable to Prototype Pollution in the expand() function in index.js. This function expands the given string into an object and allows a nested property to be set without checking the provided keys for sensitive properties like __proto__.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
expand-objectnpm | <= 0.4.2 | — |
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-4vjr-hfpp-2m7wghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-3197ghsaADVISORY
- gist.github.com/miguelafmonteiro/d8f66af61d14e06338b688f90c4dfa7cnvdWEB
- github.com/jonschlinkert/expand-object/blob/master/index.jsghsaWEB
- security.snyk.io/vuln/SNYK-JS-EXPANDOBJECT-5821390nvdWEB
- github.com/jonschlinkert/expand-object/blob/master/index.js%23L13nvd
News mentions
0No linked articles in our index yet.