counterpart vulnerable to prototype pollution
        
  Moderate severity
        
          GitHub Reviewed
      
        Published
          Sep 24, 2025 
          to the GitHub Advisory Database
          •
          Updated Sep 26, 2025 
      
  
Description
        Published by the National Vulnerability Database
      Sep 24, 2025 
    
  
        Published to the GitHub Advisory Database
      Sep 24, 2025 
    
  
        Reviewed
      Sep 26, 2025 
    
  
        Last updated
      Sep 26, 2025 
    
  
A vulnerability exists in the
counterpartlibrary for Node.js and the browser due to insufficient sanitization of user-controlled input in translation key processing. The affected versions prior to 0.18.6 allow attackers to manipulate the library's translation functionality by supplying maliciously crafted keys containing prototype chain elements (e.g., proto ), leading to prototype pollution. This weakness enables adversaries to inject arbitrary properties into the JavaScript Object prototype through the first parameter of the translate method when combined with specific separator configurations, potentially resulting in denial-of-service conditions or remote code execution in vulnerable applications. The issue arises from the library's failure to properly validate or neutralize special characters in translation key inputs before processing.References