KendoReact Prototype Pollution v3.5.0-v9.4.0 Progress Telerik
CVE-2024-12629 Published on February 12, 2025

Prototype Pollution in Progress® Telerik® KendoReact
In Progress® Telerik® KendoReact versions v3.5.0 through v9.4.0, an attacker can introduce or modify properties within the global prototype chain which can result in denial of service or command injection.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2024-12629 can be exploited with network access, and requires user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to be low. considered to have a small impact on confidentiality and integrity and availability.

Attack Vector:
NETWORK
Attack Complexity:
HIGH
Privileges Required:
HIGH
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
LOW
Integrity Impact:
LOW
Availability Impact:
LOW

Weakness Type

What is a Prototype Pollution Vulnerability?

The software receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.

CVE-2024-12629 has been classified to as a Prototype Pollution vulnerability or weakness.


Products Associated with CVE-2024-12629

stack.watch emails you whenever new vulnerabilities are published in Telerik Kendoreact or Progress Kendoreact. Just hit a watch button to start following.

 
 

Affected Versions

Progress Software Telerik KendoReact:

Exploit Probability

EPSS
0.18%
Percentile
39.88%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.