Ad

CVE-2026-34221

HIGH CVSS 4.0: 8.3 EPSS 0.10%
Updated Apr 03, 2026
Mikro-Orm
Parameter Value
CVSS 8.3 (HIGH)
Affected Versions 7.0.0 — 7.0.6
Fixed In 6.6.10
Type CWE-1321 (Prototype Pollution)
Vendor Mikro-Orm
Public PoC No

MikroORM is a TypeScript ORM for Node.js based on Data Mapper, Unit of Work and Identity Map patterns. Prior to versions 6.6.10 and 7.0.6, a prototype pollution vulnerability exists in the Utils.merge helper used internally by MikroORM when merging object structures. The function did not prevent special keys such as __proto__, constructor, or prototype, allowing attacker-controlled input to modify the JavaScript object prototype when merged.

This issue has been patched in versions 6.6.10 and 7.0.6.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
Present
Additional conditions required
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
None
No data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v4.0

Weakness Type (CWE)

Vulnerable Products 2

Configuration From (including) Up to (excluding)
Mikro-Orm Mikroorm
cpe:2.3:a:mikro-orm:mikroorm:*:*:*:*:*:node.js:*:*
6.6.10
Mikro-Orm Mikroorm
cpe:2.3:a:mikro-orm:mikroorm:*:*:*:*:*:node.js:*:*
7.0.0 7.0.6

Related Vulnerabilities