Description
A vulnerability was identified in higuma web-audio-recorder-js 0.1/0.1.1. Impacted is the function extend in the library lib/WebAudioRecorder.js of the component Dynamic Config Handling. Such manipulation leads to improperly controlled modification of object prototype attributes. It is possible to launch the attack remotely. Attacks of this nature are highly complex. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Improperly Controlled Modification of Object Prototype Attributes
Product status
0.1.1
Timeline
| 2026-02-22: | Advisory disclosed |
| 2026-02-22: | VulDB entry created |
| 2026-02-22: | VulDB entry last update |
Credits
Matan Sandori (2Bsecure)
Joshua Sheridan (2Bsecure)
MatanS (VulDB User)
MatanS (VulDB User)
References
vuldb.com/?submit.755221
vuldb.com/?id.347331 (VDB-347331 | higuma web-audio-recorder-js Dynamic Config Handling WebAudioRecorder.js extend prototype pollution)
vuldb.com/?ctiid.347331 (VDB-347331 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.755221 (Submit #755221 | higuma web-audio-recorder-js Latest (0.1.1) Prototype Pollution)