{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33383?format=json","vulnerability_id":"VCID-k6ny-gfg9-8ugd","summary":"Insecure serialization leading to RCE in serialize-javascript\nserialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function \"deleteFunctions\" within \"index.js\". \n\nAn object such as `{\"foo\": /1\"/, \"bar\": \"a\\\"@__R-<UID>-0__@\"}` was serialized as `{\"foo\": /1\"/, \"bar\": \"a\\/1\"/}`, which allows an attacker to escape the `bar` key. This requires the attacker to control the values of both `foo` and `bar` and guess the value of `<UID>`. The UID has a keyspace of approximately 4 billion making it a realistic network attack.","aliases":[{"alias":"CVE-2020-7660"},{"alias":"GHSA-hxcc-f52p-wc94"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73177?format=json","purl":"pkg:npm/serialize-javascript@3.1.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4zkq-sw4a-e7c3"},{"vulnerability":"VCID-vn8z-q24d-57bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/serialize-javascript@3.1.0"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/197697?format=json","purl":"pkg:npm/serialize-javascript@1.0.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3cbb-ghjz-fyhn"},{"vulnerability":"VCID-4zkq-sw4a-e7c3"},{"vulnerability":"VCID-k6ny-gfg9-8ugd"},{"vulnerability":"VCID-vn8z-q24d-57bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/serialize-javascript@1.0.0"},{"url":"http://public2.vulnerablecode.io/api/packages/197698?format=json","purl":"pkg:npm/serialize-javascript@1.1.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3cbb-ghjz-fyhn"},{"vulnerability":"VCID-4zkq-sw4a-e7c3"},{"vulnerability":"VCID-k6ny-gfg9-8ugd"},{"vulnerability":"VCID-vn8z-q24d-57bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/serialize-javascript@1.1.2"},{"url":"http://public2.vulnerablecode.io/api/packages/197699?format=json","purl":"pkg:npm/serialize-javascript@1.2.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3cbb-ghjz-fyhn"},{"vulnerability":"VCID-4zkq-sw4a-e7c3"},{"vulnerability":"VCID-k6ny-gfg9-8ugd"},{"vulnerability":"VCID-vn8z-q24d-57bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/serialize-javascript@1.2.0"},{"url":"http://public2.vulnerablecode.io/api/packages/197700?format=json","purl":"pkg:npm/serialize-javascript@1.3.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3cbb-ghjz-fyhn"},{"vulnerability":"VCID-4zkq-sw4a-e7c3"},{"vulnerability":"VCID-k6ny-gfg9-8ugd"},{"vulnerability":"VCID-vn8z-q24d-57bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/serialize-javascript@1.3.0"},{"url":"http://public2.vulnerablecode.io/api/packages/197701?format=json","purl":"pkg:npm/serialize-javascript@1.4.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3cbb-ghjz-fyhn"},{"vulnerability":"VCID-4zkq-sw4a-e7c3"},{"vulnerability":"VCID-k6ny-gfg9-8ugd"},{"vulnerability":"VCID-vn8z-q24d-57bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/serialize-javascript@1.4.0"},{"url":"http://public2.vulnerablecode.io/api/packages/197702?format=json","purl":"pkg:npm/serialize-javascript@1.5.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3cbb-ghjz-fyhn"},{"vulnerability":"VCID-4zkq-sw4a-e7c3"},{"vulnerability":"VCID-k6ny-gfg9-8ugd"},{"vulnerability":"VCID-vn8z-q24d-57bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/serialize-javascript@1.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/197703?format=json","purl":"pkg:npm/serialize-javascript@1.6.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3cbb-ghjz-fyhn"},{"vulnerability":"VCID-4zkq-sw4a-e7c3"},{"vulnerability":"VCID-k6ny-gfg9-8ugd"},{"vulnerability":"VCID-vn8z-q24d-57bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/serialize-javascript@1.6.0"},{"url":"http://public2.vulnerablecode.io/api/packages/197704?format=json","purl":"pkg:npm/serialize-javascript@1.6.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3cbb-ghjz-fyhn"},{"vulnerability":"VCID-4zkq-sw4a-e7c3"},{"vulnerability":"VCID-k6ny-gfg9-8ugd"},{"vulnerability":"VCID-vn8z-q24d-57bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/serialize-javascript@1.6.1"},{"url":"http://public2.vulnerablecode.io/api/packages/197705?format=json","purl":"pkg:npm/serialize-javascript@1.7.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3cbb-ghjz-fyhn"},{"vulnerability":"VCID-4zkq-sw4a-e7c3"},{"vulnerability":"VCID-k6ny-gfg9-8ugd"},{"vulnerability":"VCID-vn8z-q24d-57bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/serialize-javascript@1.7.0"},{"url":"http://public2.vulnerablecode.io/api/packages/197706?format=json","purl":"pkg:npm/serialize-javascript@1.8.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3cbb-ghjz-fyhn"},{"vulnerability":"VCID-4zkq-sw4a-e7c3"},{"vulnerability":"VCID-k6ny-gfg9-8ugd"},{"vulnerability":"VCID-vn8z-q24d-57bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/serialize-javascript@1.8.0"},{"url":"http://public2.vulnerablecode.io/api/packages/197707?format=json","purl":"pkg:npm/serialize-javascript@1.9.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3cbb-ghjz-fyhn"},{"vulnerability":"VCID-4zkq-sw4a-e7c3"},{"vulnerability":"VCID-k6ny-gfg9-8ugd"},{"vulnerability":"VCID-vn8z-q24d-57bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/serialize-javascript@1.9.0"},{"url":"http://public2.vulnerablecode.io/api/packages/197708?format=json","purl":"pkg:npm/serialize-javascript@1.9.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3cbb-ghjz-fyhn"},{"vulnerability":"VCID-4zkq-sw4a-e7c3"},{"vulnerability":"VCID-k6ny-gfg9-8ugd"},{"vulnerability":"VCID-vn8z-q24d-57bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/serialize-javascript@1.9.1"},{"url":"http://public2.vulnerablecode.io/api/packages/197709?format=json","purl":"pkg:npm/serialize-javascript@2.0.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3cbb-ghjz-fyhn"},{"vulnerability":"VCID-4zkq-sw4a-e7c3"},{"vulnerability":"VCID-k6ny-gfg9-8ugd"},{"vulnerability":"VCID-vn8z-q24d-57bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/serialize-javascript@2.0.0"},{"url":"http://public2.vulnerablecode.io/api/packages/197710?format=json","purl":"pkg:npm/serialize-javascript@2.1.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3cbb-ghjz-fyhn"},{"vulnerability":"VCID-4zkq-sw4a-e7c3"},{"vulnerability":"VCID-k6ny-gfg9-8ugd"},{"vulnerability":"VCID-vn8z-q24d-57bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/serialize-javascript@2.1.0"},{"url":"http://public2.vulnerablecode.io/api/packages/78824?format=json","purl":"pkg:npm/serialize-javascript@2.1.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4zkq-sw4a-e7c3"},{"vulnerability":"VCID-k6ny-gfg9-8ugd"},{"vulnerability":"VCID-vn8z-q24d-57bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/serialize-javascript@2.1.1"},{"url":"http://public2.vulnerablecode.io/api/packages/207051?format=json","purl":"pkg:npm/serialize-javascript@2.1.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4zkq-sw4a-e7c3"},{"vulnerability":"VCID-k6ny-gfg9-8ugd"},{"vulnerability":"VCID-vn8z-q24d-57bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/serialize-javascript@2.1.2"},{"url":"http://public2.vulnerablecode.io/api/packages/207052?format=json","purl":"pkg:npm/serialize-javascript@3.0.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4zkq-sw4a-e7c3"},{"vulnerability":"VCID-k6ny-gfg9-8ugd"},{"vulnerability":"VCID-vn8z-q24d-57bu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/serialize-javascript@3.0.0"},{"url":"http://public2.vulnerablecode.io/api/packages/102969?format=json","purl":"pkg:rpm/redhat/servicemesh-grafana@6.2.2-38?arch=el8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9s34-1nd8-f7ee"},{"vulnerability":"VCID-drfs-tub9-zqgg"},{"vulnerability":"VCID-ed2w-eexq-kuam"},{"vulnerability":"VCID-fph7-rrjp-uqa1"},{"vulnerability":"VCID-gg1m-2vwq-euet"},{"vulnerability":"VCID-j6nn-jkc5-k3f6"},{"vulnerability":"VCID-k6ny-gfg9-8ugd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-grafana@6.2.2-38%3Farch=el8"},{"url":"http://public2.vulnerablecode.io/api/packages/102970?format=json","purl":"pkg:rpm/redhat/servicemesh-grafana@6.4.3-11?arch=el8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3cbb-ghjz-fyhn"},{"vulnerability":"VCID-9s34-1nd8-f7ee"},{"vulnerability":"VCID-drfs-tub9-zqgg"},{"vulnerability":"VCID-ed2w-eexq-kuam"},{"vulnerability":"VCID-fph7-rrjp-uqa1"},{"vulnerability":"VCID-gg1m-2vwq-euet"},{"vulnerability":"VCID-j6nn-jkc5-k3f6"},{"vulnerability":"VCID-k6ny-gfg9-8ugd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-grafana@6.4.3-11%3Farch=el8"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7660.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7660.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7660","reference_id":"","reference_type":"","scores":[{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.8651","published_at":"2026-05-16T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.86414","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.86434","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.86453","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.86449","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.86499","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.86509","published_at":"2026-05-15T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.8629","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.86299","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.86317","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.86318","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.86336","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.86346","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.8636","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.86358","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.86353","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.86369","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.86374","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.86367","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.86388","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.86397","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02901","scoring_system":"epss","scoring_elements":"0.86394","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7660"},{"reference_url":"https://github.com/yahoo/serialize-javascript","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/yahoo/serialize-javascript"},{"reference_url":"https://github.com/yahoo/serialize-javascript/commit/f21a6fb3ace2353413761e79717b2d210ba6ccbd","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/yahoo/serialize-javascript/commit/f21a6fb3ace2353413761e79717b2d210ba6ccbd"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7660","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7660"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1844228","reference_id":"1844228","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1844228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2796","reference_id":"RHSA-2020:2796","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2796"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2861","reference_id":"RHSA-2020:2861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2861"}],"weaknesses":[{"cwe_id":502,"name":"Deserialization of Untrusted Data","description":"The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid."},{"cwe_id":1035,"name":"OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017."},{"cwe_id":937,"name":"OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013."}],"exploits":[],"severity_range_score":"7.0 - 8.9","exploitability":"0.5","weighted_severity":"8.0","risk_score":4.0,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k6ny-gfg9-8ugd"}