Home

Description

content-security-policy-parser parses content security policy directives. A prototype pollution vulnerability exists in versions 0.5.0 and earlier, wherein if a policy name is called __proto__, one can override the Object prototype. This issue has been patched in version 0.6.0. A workaround involves disabling prototype method in NodeJS, neutralizing all possible prototype pollution attacks. Provide either --disable-proto=delete (recommended) or --disable-proto=throw as an argument to node to enable this feature.

PUBLISHED Reserved 2025-08-07 | Published 2025-08-12 | Updated 2025-08-20 | Assigner GitHub_M




HIGH: 8.8CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

Product status

< 0.6.0
affected

References

github.com/...parser/security/advisories/GHSA-w2cq-g8g3-gm83

github.com/helmetjs/content-security-policy-parser/issues/11

github.com/...ommit/b13a52554f0168af393e3e38ed4a94e9e6aea9dc

cve.org (CVE-2025-55164)

nvd.nist.gov (CVE-2025-55164)

Download JSON