In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsThis was deemed not a vulnerability.
express is a minimalist web framework.
Affected versions of this package are vulnerable to Prototype Pollution in the request.query object. An attacker can modify inherited object prototype properties by supplying query string parameters that match prototype property names.
This is only exploitable if the extended query parser is enabled. This is the default in 4.x versions but must be configured in 5.x, such as with 'query parser': 'extended'.
This vulnerability can be mitigated by providing qs directly and specifying plainObjects: true when parsing query strings.
Note:
CVE-2024-51999 was rejected by the CVE List with the reason "This advisory has been withdrawn because it describes a correctness bug, not a vulnerability with real security impact".