Two critical prototype pollution vulnerabilities have been discovered in the `convict` npm package, potentially leading to remote code execution. These vulnerabilities, tracked as CVE-2026-33864 and CVE-2026-33863, affect applications using `convict` to handle attacker-controlled input. A fix is available in version 6.2.5.
With a CVSS score of 9.5, these are critical vulnerabilities requiring immediate attention.
What is Convict?
CVE-2026-33864: Prototype Pollution via startsWith() Bypass
Critical vulnerability, requiring immediate attention and patching.
A prototype pollution vulnerability exists in `convict` due to insufficient input validation. By manipulating the `String.prototype.startsWith` function, attackers can bypass the intended security checks and pollute the `Object.prototype`.
How to fix CVE-2026-33864 in Convict
Patch immediately- 1.Update the `convict` package to version 6.2.5 or later.
npm update convictNextGuard automatically flags CVE-2026-33864 if Convict appears in any of your monitored projects — no manual lookup required.
CVE-2026-33863: Prototype Pollution via load(), loadFile(), and Schema Initialization
Critical vulnerability, requiring immediate attention and patching.
Prototype pollution vulnerabilities exist in `convict` through the `load()` and `loadFile()` functions, as well as during schema initialization. These functions recursively merge configuration data without proper validation, allowing attackers to inject malicious properties into `Object.prototype`.
How to fix CVE-2026-33863 in Convict
Patch immediately- 1.Update the `convict` package to version 6.2.5 or later.
npm update convictWorkaround: Do not pass untrusted data to load(), loadFile(), or convict().
Stay ahead of nodejs vulnerabilities
Proactively detect and respond to security threats in your nodejs applications. monitor your nodejs dependencies for real-time vulnerability alerts.
Compare PlansFrequently asked questions
These prototype pollution vulnerabilities in `convict` pose a significant risk to Node.js applications. It is crucial to update to version 6.2.5 immediately and see all nodejs vulnerabilities to ensure the security of your projects.
Related topics