CVE-2024-51999 – express improperly controls modification of query properties

The following table lists the changes that have been made to the
CVE-2024-51999 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Dec. 01, 2025

    Action Type Old Value New Value
    Added Description Express.js minimalist web framework for node. Prior to 5.2.0 and 4.22.0, when using the extended query parser in express (‘query parser’: ‘extended’), the request.query object inherits all object prototype properties, but these properties can be overwritten by query string parameter keys that match the property names. This vulnerability is fixed in 5.2.0 and 4.22.0.
    Added CVSS V4.0 AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-915
    Added Reference https://github.com/expressjs/express/commit/2f64f68c37c64ae333e41ff38032d21860f22255
    Added Reference https://github.com/expressjs/express/releases/tag/4.22.0
    Added Reference https://github.com/expressjs/express/releases/tag/v5.2.0
    Added Reference https://github.com/expressjs/express/security/advisories/GHSA-pj86-cfqh-vqx6
Share the Post:

Related Posts