Skip to content

Commit 0c58fb6

Browse files
authored
add plotly vulnerability inherited from plotly.js (#19)
* add plotly vulnerability inherited from plotly.js * add modified field
1 parent 8a418eb commit 0c58fb6

File tree

2 files changed

+50
-1
lines changed

2 files changed

+50
-1
lines changed

latest-id.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
2023-9
1+
2025-1

vulns/plotly/RSEC-2025-1.yaml

Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
id: RSEC-2025-1
2+
details: |
3+
The plotly R package up through the latest 4.11.0 includes plotly.js library 2.11.1.
4+
Plotly.js releases prior to version 2.5.2 have a risk of __proto__ being polluted in expandObjectPaths or nestedProperty.
5+
summary: Risk of __proto__ pollution Vulnerability
6+
affected:
7+
- package:
8+
name: plotly
9+
ecosystem: CRAN
10+
ranges:
11+
- type: ECOSYSTEM
12+
events:
13+
- introduced: "2.0.2"
14+
versions:
15+
- "2.0.2"
16+
- "2.0.3"
17+
- "2.0.16"
18+
- "3.4.1"
19+
- "3.4.13"
20+
- "3.6.0"
21+
- "4.5.2"
22+
- "4.5.6"
23+
- "4.6.0"
24+
- "4.7.0"
25+
- "4.7.1"
26+
- "4.8.0"
27+
- "4.9.0"
28+
- "4.9.1"
29+
- "4.9.2"
30+
- "4.9.2.1"
31+
- "4.9.2.2"
32+
- "4.9.3"
33+
- "4.9.4"
34+
- "4.9.4.1"
35+
- "4.10.0"
36+
- "4.10.1"
37+
- "4.10.2"
38+
- "4.10.3"
39+
- "4.10.4"
40+
- "4.11.0"
41+
references:
42+
- type: WEB
43+
url: https://github.com/plotly/plotly.R/issues/2463
44+
- type: WEB
45+
url: https://nvd.nist.gov/vuln/detail/CVE-2023-46308
46+
upstream:
47+
- CVE-2023-46308
48+
published: "2025-12-23T15:00:00Z"
49+
modified: "2025-12-23T15:00:00Z"

0 commit comments

Comments
 (0)