Cyber Posture

CVE-2026-29063

CriticalPublic PoC

Published: 06 March 2026

Published
06 March 2026
Modified
17 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0021 43.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-29063 is a critical-severity Prototype Pollution (CWE-1321) vulnerability in Immutable-Js Immutable. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 43.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely patching of the vulnerable Immutable.js library to fixed versions 3.8.3, 4.3.7, or 5.1.5, eliminating the prototype pollution flaw.

detect

Requires vulnerability scanning that would identify the presence of vulnerable Immutable.js versions affected by CVE-2026-29063.

prevent

Enforces input validation and sanitization to block malicious payloads targeting the mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject() APIs.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Prototype pollution vulnerability in public-facing JavaScript library enables remote unauthenticated exploitation of web applications, directly mapping to Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Immutable.js provides many Persistent Immutable data structures. Prior to versions 3.8.3, 4.3.7, and 5.1.5, Prototype Pollution is possible in immutable via the mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject() APIs. This issue has been patched in versions 3.8.3, 4.3.7, and 5.1.5.

Deeper analysisAI

CVE-2026-29063 is a prototype pollution vulnerability (CWE-1321) in the Immutable.js JavaScript library, which provides persistent immutable data structures. The flaw affects versions prior to 3.8.3, 4.3.7, and 5.1.5, where attackers can exploit it through the mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject() APIs. It has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to high impacts on confidentiality, integrity, and availability.

Remote attackers require no privileges or user interaction to exploit this over the network with low complexity. Successful exploitation enables prototype pollution, allowing modification of the Object prototype and potentially leading to arbitrary code execution, denial of service, or other impacts depending on how the library is used in the application.

The issue has been patched in Immutable.js versions 3.8.3, 4.3.7, and 5.1.5, as detailed in the project's GitHub security advisory (GHSA-wf6x-7x77-mvgw) and corresponding release notes. Security practitioners should prioritize upgrading affected applications to these fixed versions to mitigate the vulnerability.

Details

CWE(s)

Affected Products

immutable-js
immutable
3.0.0 — 3.8.3 · 4.0.0 — 4.3.7 · 5.0.0 — 5.1.5

CVEs Like This One

CVE-2026-32621Shared CWE-1321
CVE-2026-33994Shared CWE-1321
CVE-2025-61140Shared CWE-1321
CVE-2026-35209Shared CWE-1321
CVE-2026-24888Shared CWE-1321
CVE-2026-32878Shared CWE-1321
CVE-2024-38988Shared CWE-1321
CVE-2026-34221Shared CWE-1321
CVE-2026-28794Shared CWE-1321
CVE-2025-66456Shared CWE-1321

References