Cyber Posture

CVE-2026-23736

High

Published: 21 January 2026

Published
21 January 2026
Modified
27 February 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0021 42.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-23736 is a high-severity Prototype Pollution (CWE-1321) vulnerability in Lxsmnsyc Seroval. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 42.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates proper validation of untrusted JSON inputs to block malicious object keys that cause prototype pollution during seroval deserialization.

prevent

Requires timely flaw remediation by upgrading vulnerable seroval versions 1.4.0 and below to the patched 1.4.1.

detect

Enables vulnerability scanning to identify and prioritize exploitation risks from known CVEs like CVE-2026-23736 in application dependencies.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1565.003 Runtime Data Manipulation Impact
Adversaries may modify systems in order to manipulate the data as it is accessed and displayed to an end user, thus threatening the integrity of the data.
Why these techniques?

CVE enables remote exploitation of public-facing applications via malicious JSON input (T1190) leading to prototype pollution, a form of runtime data manipulation (T1565.003).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0 and below, due to improper input validation, a malicious object key can lead to prototype pollution during JSON deserialization. This vulnerability affects only JSON deserialization functionality.…

more

This issue is fixed in version 1.4.1.

Deeper analysisAI

CVE-2026-23736 is a vulnerability in the seroval JavaScript library, which enables stringification of JavaScript values including complex structures beyond standard JSON.stringify capabilities. In versions 1.4.0 and below, improper input validation allows a malicious object key to cause prototype pollution during JSON deserialization. This issue is limited to the JSON deserialization functionality and is associated with CWE-1321. The vulnerability received a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) and was published on 2026-01-21.

A remote, unauthenticated attacker can exploit this vulnerability by supplying malicious input to an affected seroval JSON deserialization operation. Successful exploitation leads to prototype pollution, where the attacker can modify properties on Object.prototype, potentially enabling further attacks such as denial of service, information disclosure, or code execution depending on the application's use of polluted prototypes. The low complexity and lack of privileges required make it accessible to attackers targeting applications that process untrusted JSON inputs with vulnerable seroval versions.

The seroval security advisory (GHSA-hj76-42vx-jwp4) and corresponding commit (ce9408ebc87312fcad345a73c172212f2a798060) confirm the issue is fixed in version 1.4.1 through improved input validation. Security practitioners should upgrade to seroval 1.4.1 or later and review applications for unsafe deserialization of untrusted JSON inputs using this library.

Details

CWE(s)

Affected Products

lxsmnsyc
seroval
≤ 1.4.1

CVEs Like This One

CVE-2026-23737Same product: Lxsmnsyc Seroval
CVE-2026-23957Same product: Lxsmnsyc Seroval
CVE-2026-23956Same product: Lxsmnsyc Seroval
CVE-2026-24006Same product: Lxsmnsyc Seroval
CVE-2026-27837Shared CWE-1321
CVE-2026-32621Shared CWE-1321
CVE-2026-29063Shared CWE-1321
CVE-2026-33994Shared CWE-1321
CVE-2025-61140Shared CWE-1321
CVE-2026-35209Shared CWE-1321

References