Severity
8.9HIGHNVD
EPSS
0.0%
top 86.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 20

Description

flatted is a circular JSON parser. Prior to version 3.4.2, the parse() function in flatted can use attacker-controlled string values from the parsed JSON as direct array index keys, without validating that they are numeric. Since the internal input buffer is a JavaScript Array, accessing it with the key "__proto__" returns Array.prototype via the inherited getter. This object is then treated as a legitimate parsed value and assigned as a property of the output object, effectively leaking a live

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Patches

🔴Vulnerability Details

3
OSV
CVE-2026-33228: flatted is a circular JSON parser2026-03-20
GHSA
Prototype Pollution via parse() in NodeJS flatted2026-03-19
OSV
Prototype Pollution via parse() in NodeJS flatted2026-03-19

📋Vendor Advisories

3
Red Hat
flatted: Flatted: Prototype pollution vulnerability allows arbitrary code execution via crafted JSON.2026-03-20
Microsoft
flatted: Prototype Pollution via parse()2026-03-10
Debian
CVE-2026-33228: node-flatted - flatted is a circular JSON parser. Prior to version 3.4.2, the parse() function ...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-33228 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-33228 — Prototype Pollution in Flatted | cvebase