CVE-2025-57327
Description
spmrc is a package that provides the rc manager for spm. A Prototype Pollution vulnerability in the set and config function of spmrc version 1.2.0 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A prototype pollution vulnerability in spmrc versions ≤1.2.0 allows attackers to inject properties into Object.prototype via crafted payloads, leading to denial of service.
Vulnerability
Overview
The spmrc package, which provides the rc manager for spm, contains a Prototype Pollution vulnerability in its set() and config() functions. The root cause is improper handling of property assignments when processing user-supplied input containing nested property paths such as __proto__.pollutedProp. This allows attackers to inject arbitrary properties into the prototype of built-in JavaScript objects [1][3].
Exploitation
An attacker can exploit this by providing a crafted payload to the set() or config() method of spmrc. These functions are designed to set configuration values using dot-separated keys (e.g., user.username), but they do not sanitize or block prototype-related keys. Any application that passes untrusted input to these functions is vulnerable. No authentication or special network position is required beyond the ability to supply input to the affected methods [2][3].
Impact
The minimum consequence is denial of service (DoS) due to unexpected behavior of objects that rely on unmodified prototypes. In contexts where prototype pollution can be leveraged further, arbitrary code execution may be possible, as the polluted prototype can affect all objects in the runtime [1][3].
Mitigation
Status
As of the publication date, no official patch has been released for spmrc version 1.2.0 or earlier. Users are advised to avoid passing untrusted input to the set() and config() functions, or to consider replacing the package with an alternative that properly sanitizes prototype keys [1][3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
spmrcnpm | <= 1.2.0 | — |
Affected products
2- spmrc/spmrcdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.