In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade devalue to version 5.6.4 or higher.
devalue is a JSON.stringify, but handles cyclical references, repeated references, undefined, regular expressions, dates, Map and Set.
Affected versions of this package are vulnerable to Improper Validation of Specified Type of Input in the hydrate() function that can accept __proto__ keys emitted from devalue.parse() or devalue.unflatten() functions. An attacker can manipulate object properties by supplying input that creates objects with a __proto__ own property, which may lead to prototype pollution in downstream code when such objects are merged or assigned.