We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Versions of the package expand-object from 0.0.0 are vulnerable to Prototype Pollution in the expand() function in index.js. This function expands the given string into an object and allows a nested property to be set without checking the provided keys for sensitive properties like __proto__.
Reserved 2025-04-03 | Published 2025-04-04 | Updated 2025-04-04 | Assigner snykMiguel Monteiro
security.snyk.io/vuln/SNYK-JS-EXPANDOBJECT-5821390
gist.github.com/...monteiro/d8f66af61d14e06338b688f90c4dfa7c
github.com/...linkert/expand-object/blob/master/index.js#L13
Support options