Skip to content

vwc-carousel-2.45.0.tgz: 1 vulnerabilities (highest severity is: 9.3) unreachable #100

@mend-for-github-com

Description

@mend-for-github-com
Vulnerable Library - vwc-carousel-2.45.0.tgz

Path to dependency file: /package.json

Path to vulnerable library: /package.json

Found in HEAD commit: 9e46d67b86f46339ecc0d6e70236da26187a1734

Vulnerabilities

Vulnerability Severity CVSS Exploit Maturity EPSS Dependency Type Fixed in (vwc-carousel version) Remediation Possible** Reachability
CVE-2026-27212 Critical 9.3 Not Defined swiper-6.8.4.tgz Transitive N/A*

Unreachable

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2026-27212

Vulnerable Library - swiper-6.8.4.tgz

Most modern mobile touch slider and framework with hardware accelerated transitions

Library home page: https://registry.npmjs.org/swiper/-/swiper-6.8.4.tgz

Path to dependency file: /package.json

Path to vulnerable library: /package.json

Dependency Hierarchy:

  • vwc-carousel-2.45.0.tgz (Root Library)
    • swiper-6.8.4.tgz (Vulnerable Library)

Found in HEAD commit: 9e46d67b86f46339ecc0d6e70236da26187a1734

Found in base branch: master

Reachability Analysis

The vulnerable code is unreachable

Vulnerability Details

Swiper is a free and mobile touch slider with hardware accelerated transitions and native behavior. Versions 6.5.1 through 12.1.1 have a Prototype pollution vulnerability. The vulnerability resides in line 94 of shared/utils.mjs, where the indexOf() function is used to check whether user provided input contain forbidden strings. Despite a previous fix that attempted to mitigate prototype pollution by checking whether user input contained a forbidden key, it is still possible to pollute Object.prototype via a crafted input using Array.prototype. The exploit works across Windows and Linux and on Node and Bun runtimes. Any application that processes attacker-controlled input using this package may be affected by the following: Authentication Bypass, Denial of Service and RCE. This issue is fixed in version 12.1.2.

Publish Date: 2026-02-21

URL: CVE-2026-27212

Threat Assessment

Exploit Maturity: Not Defined

EPSS:

CVSS 3 Score Details (9.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-hmx5-qpq5-p643

Release Date: 2026-02-20

Fix Resolution: swiper - 12.1.2

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions