Critical severity9.1NVD Advisory· Published Mar 31, 2026· Updated Apr 3, 2026
CVE-2026-34221
CVE-2026-34221
Description
MikroORM is a TypeScript ORM for Node.js based on Data Mapper, Unit of Work and Identity Map patterns. Prior to versions 6.6.10 and 7.0.6, a prototype pollution vulnerability exists in the Utils.merge helper used internally by MikroORM when merging object structures. The function did not prevent special keys such as __proto__, constructor, or prototype, allowing attacker-controlled input to modify the JavaScript object prototype when merged. This issue has been patched in versions 6.6.10 and 7.0.6.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@mikro-orm/corenpm | < 6.6.10 | 6.6.10 |
@mikro-orm/corenpm | >= 7.0.0-dev.0, < 7.0.6 | 7.0.6 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-qpfv-44f3-qqx6ghsaADVISORY
- github.com/mikro-orm/mikro-orm/security/advisories/GHSA-qpfv-44f3-qqx6nvdVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-34221ghsaADVISORY
News mentions
0No linked articles in our index yet.