Swiper is a free and mobile touch slider with hardware accelerated transitions and native behavior. Versions 6.5.1 through 12.1.1 have a Prototype pollution vulnerability. The vulnerability resides in line 94 of shared/utils.mjs, where the indexOf() function is used to check whether user provided input contain forbidden strings. Despite a previous fix that attempted to mitigate prototype pollution by checking whether user input contained a forbidden key, it is still possible to pollute Object.prototype via a crafted input using Array.prototype. The exploit works across Windows and Linux and on Node and Bun runtimes. Any application that processes attacker-controlled input using this package may be affected by the following: Authentication Bypass, Denial of Service and RCE. This issue is fixed in version 12.1.2.

Project Subscriptions

Vendors Products
Nolimits4web Subscribe
Swiperjs Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-hmx5-qpq5-p643 Prototype pollution in swiper
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 24 Feb 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Swiperjs
Swiperjs swiper
CPEs cpe:2.3:a:swiperjs:swiper:*:*:*:*:*:node.js:*:*
Vendors & Products Swiperjs
Swiperjs swiper
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Nolimits4web
Nolimits4web swiper
Vendors & Products Nolimits4web
Nolimits4web swiper

Sat, 21 Feb 2026 06:00:00 +0000

Type Values Removed Values Added
Description Swiper is a free and mobile touch slider with hardware accelerated transitions and native behavior. Versions 6.5.1 through 12.1.1 have a Prototype pollution vulnerability. The vulnerability resides in line 94 of shared/utils.mjs, where the indexOf() function is used to check whether user provided input contain forbidden strings. Despite a previous fix that attempted to mitigate prototype pollution by checking whether user input contained a forbidden key, it is still possible to pollute Object.prototype via a crafted input using Array.prototype. The exploit works across Windows and Linux and on Node and Bun runtimes. Any application that processes attacker-controlled input using this package may be affected by the following: Authentication Bypass, Denial of Service and RCE. This issue is fixed in version 12.1.2.
Title Swiper has a Prototype Pollution Vulnerability
Weaknesses CWE-1321
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-21T05:43:07.072Z

Reserved: 2026-02-18T19:47:02.156Z

Link: CVE-2026-27212

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-02-21T06:17:01.443

Modified: 2026-02-24T15:16:56.670

Link: CVE-2026-27212

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-23T14:32:34Z

Weaknesses