Home

Description

Swiper is a free and mobile touch slider with hardware accelerated transitions and native behavior. Versions 6.5.1 through 12.1.1 have a Prototype pollution vulnerability. The vulnerability resides in line 94 of shared/utils.mjs, where the indexOf() function is used to check whether user provided input contain forbidden strings. Despite a previous fix that attempted to mitigate prototype pollution by checking whether user input contained a forbidden key, it is still possible to pollute Object.prototype via a crafted input using Array.prototype. The exploit works across Windows and Linux and on Node and Bun runtimes. Any application that processes attacker-controlled input using this package may be affected by the following: Authentication Bypass, Denial of Service and RCE. This issue is fixed in version 12.1.2.

PUBLISHED Reserved 2026-02-18 | Published 2026-02-21 | Updated 2026-02-24 | Assigner GitHub_M




CRITICAL: 9.4CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

Product status

>= 6.5.1, < 12.1.2
affected

References

github.com/...swiper/security/advisories/GHSA-hmx5-qpq5-p643

github.com/...ommit/d3e663322a13043ca63aaba235d8cf3900e0c8cf

github.com/nolimits4web/swiper/releases/tag/v12.1.2

cve.org (CVE-2026-27212)

nvd.nist.gov (CVE-2026-27212)

Download JSON