### [CVE-2022-25645](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25645) ![](https://img.shields.io/static/v1?label=Product&message=dset&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%200%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Prototype%20Pollution&color=brighgreen) ### Description All versions of package dset are vulnerable to Prototype Pollution via 'dset/merge' mode, as the dset function checks for prototype pollution by validating if the top-level path contains __proto__, constructor or protorype. By crafting a malicious object, it is possible to bypass this check and achieve prototype pollution. ### POC #### Reference - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2431974 - https://snyk.io/vuln/SNYK-JS-DSET-2330881 #### Github No PoCs found on GitHub currently.