Prototype Pollution in Telerik Kendo UI Vue v2.4v6.0.1 Enables Injection
CVE-2024-11628 Published on February 12, 2025
Prototype Pollution in Progress® Telerik® Kendo UI for Vue
In Progress® Telerik® Kendo UI for Vue versions v2.4.0 through v6.0.1, an attacker can introduce or modify properties within the global prototype chain which can result in denial of service or command injection.
Vulnerability Analysis
CVE-2024-11628 is exploitable with network access, and requires user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to be low. considered to have a small impact on confidentiality and integrity and availability.
Weakness Type
What is a Prototype Pollution Vulnerability?
The software receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.
CVE-2024-11628 has been classified to as a Prototype Pollution vulnerability or weakness.
Products Associated with CVE-2024-11628
stack.watch emails you whenever new vulnerabilities are published in Telerik Kendo Ui For Vue or Progress Kendo Ui For Vue. Just hit a watch button to start following.
Affected Versions
Progress Software Progress® Telerik® Kendo UI for Vue:- Version 2.4.0 and below 6.1.0 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.