Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-5150


A vulnerability was found in docarray up to 0.40.1. It has been rated as critical. Affected by this issue is the function __getitem__ of the file /docarray/data/torch_dataset.py of the component Web API. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.


Published

2025-05-25T15:15:22.667

Last Modified

2025-06-03T12:58:43.070

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 6.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.0

Impact Score

6.4

Weaknesses
  • Type: Secondary
    CWE-94
    CWE-1321
  • Type: Primary
    CWE-1321

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application linuxfoundation docarray ≤ 0.40.1 Yes

References