### [CVE-2023-26102](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26102) ![](https://img.shields.io/static/v1?label=Product&message=rangy&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%20*%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Prototype%20Pollution&color=brighgreen) ### Description All versions of the package rangy are vulnerable to Prototype Pollution when using the extend() function in file rangy-core.js.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype ### POC #### Reference - https://github.com/timdown/rangy/issues/478 - https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702 #### Github No PoCs found on GitHub currently.