{"api_version":"1","generated_at":"2026-04-23T04:33:21+00:00","cve":"CVE-2020-15366","urls":{"html":"https://cve.report/CVE-2020-15366","api":"https://cve.report/api/cve/CVE-2020-15366.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-15366","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-15366"},"summary":{"title":"CVE-2020-15366","description":"An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2020-07-15 20:15:00","updated_at":"2022-12-02 19:56:00"},"problem_types":["CWE-1321"],"metrics":[],"references":[{"url":"https://github.com/ajv-validator/ajv/releases/tag/v6.12.3","name":"https://github.com/ajv-validator/ajv/releases/tag/v6.12.3","refsource":"MISC","tags":["Release Notes","Third Party Advisory"],"title":"Release v6.12.3 · ajv-validator/ajv · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/ajv-validator/ajv/tags","name":"https://github.com/ajv-validator/ajv/tags","refsource":"MISC","tags":["Third Party Advisory"],"title":"Tags · ajv-validator/ajv · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://hackerone.com/bugs?subject=user&report_id=894259","name":"https://hackerone.com/bugs?subject=user&report_id=894259","refsource":"MISC","tags":["Permissions Required"],"title":"HackerOne","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-15366","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15366","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"15366","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ajv.js","cpe5":"ajv","cpe6":"6.12.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"15366","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ajv.js","cpe5":"ajv","cpe6":"6.12.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-15366","qid":"377388","title":"Alibaba Cloud Linux Security Update for nodejs:14 (ALINUX3-SA-2021:0016)"},{"cve":"CVE-2020-15366","qid":"940231","title":"AlmaLinux Security Update for nodejs:10 (ALSA-2021:0548)"},{"cve":"CVE-2020-15366","qid":"940254","title":"AlmaLinux Security Update for nodejs:14 (ALSA-2021:0551)"},{"cve":"CVE-2020-15366","qid":"940276","title":"AlmaLinux Security Update for nodejs:12 (ALSA-2020:5499)"},{"cve":"CVE-2020-15366","qid":"960263","title":"Rocky Linux Security Update for nodejs:12 (RLSA-2020:5499)"},{"cve":"CVE-2020-15366","qid":"960749","title":"Rocky Linux Security Update for nodejs:14 (RLSA-2021:0551)"},{"cve":"CVE-2020-15366","qid":"960843","title":"Rocky Linux Security Update for nodejs:10 (RLSA-2021:0548)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-15366","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://hackerone.com/bugs?subject=user&report_id=894259","refsource":"MISC","name":"https://hackerone.com/bugs?subject=user&report_id=894259"},{"url":"https://github.com/ajv-validator/ajv/tags","refsource":"MISC","name":"https://github.com/ajv-validator/ajv/tags"},{"refsource":"MISC","name":"https://github.com/ajv-validator/ajv/releases/tag/v6.12.3","url":"https://github.com/ajv-validator/ajv/releases/tag/v6.12.3"}]}},"nvd":{"publishedDate":"2020-07-15 20:15:00","lastModifiedDate":"2022-12-02 19:56:00","problem_types":["CWE-1321"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW","baseScore":5.6,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.2,"impactScore":3.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ajv.js:ajv:6.12.2:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"15366","Ordinal":"176749","Title":"CVE-2020-15366","CVE":"CVE-2020-15366","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"15366","Ordinal":"1","NoteData":"An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)","Type":"Description","Title":null},{"CveYear":"2020","CveId":"15366","Ordinal":"2","NoteData":"2020-07-15","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"15366","Ordinal":"3","NoteData":"2020-07-15","Type":"Other","Title":"Modified"}]}}}