Prototype Pollution in Telerik Kendo UI Vue v2.4v6.0.1 Enables Injection
CVE-2024-11628 Published on February 12, 2025

Prototype Pollution in Progress® Telerik® Kendo UI for Vue
In Progress® Telerik® Kendo UI for Vue versions v2.4.0 through v6.0.1, an attacker can introduce or modify properties within the global prototype chain which can result in denial of service or command injection.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2024-11628 is exploitable with network access, and requires user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to be low. considered to have a small impact on confidentiality and integrity and availability.

Attack Vector:
NETWORK
Attack Complexity:
HIGH
Privileges Required:
HIGH
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
LOW
Integrity Impact:
LOW
Availability Impact:
LOW

Weakness Type

What is a Prototype Pollution Vulnerability?

The software receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.

CVE-2024-11628 has been classified to as a Prototype Pollution vulnerability or weakness.


Products Associated with CVE-2024-11628

stack.watch emails you whenever new vulnerabilities are published in Telerik Kendo Ui For Vue or Progress Kendo Ui For Vue. Just hit a watch button to start following.

 
 

Affected Versions

Progress Software Progress® Telerik® Kendo UI for Vue:

Exploit Probability

EPSS
0.22%
Percentile
43.98%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.