CVE-2024-21548

Versions of the package bun after 0.0.12 and before 1.1.30 are vulnerable to Prototype Pollution due to improper input sanitization. An attacker can exploit this vulnerability through Bun's APIs that accept objects. **Note:** This issue relates to the widely known and actively developed 'Bun' JavaScript runtime. The bun package on NPM at versions 0.0.12 and below belongs to a different and older project that happened to claim the 'bun' name in the past.
Configurations

No configuration.

History

24 Jul 2025, 07:15

Type Values Removed Values Added
Summary
  • (es) Las versiones del paquete bun anteriores a la 1.1.30 son vulnerables a la contaminación de prototipos debido a una desinfección de entrada incorrecta. Un atacante puede aprovechar esta vulnerabilidad a través de las API de Bun que aceptan objetos.
Summary (en) Versions of the package bun before 1.1.30 are vulnerable to Prototype Pollution due to improper input sanitization. An attacker can exploit this vulnerability through Bun's APIs that accept objects. (en) Versions of the package bun after 0.0.12 and before 1.1.30 are vulnerable to Prototype Pollution due to improper input sanitization. An attacker can exploit this vulnerability through Bun's APIs that accept objects. **Note:** This issue relates to the widely known and actively developed 'Bun' JavaScript runtime. The bun package on NPM at versions 0.0.12 and below belongs to a different and older project that happened to claim the 'bun' name in the past.

18 Dec 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-18 06:15

Updated : 2025-07-24 07:15


NVD link : CVE-2024-21548

Mitre link : CVE-2024-21548

CVE.ORG link : CVE-2024-21548


JSON object : View

Products Affected

No product.

CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')