OSS Security KBlive

minimist (npm)

Registry: npm Weekly Downloads: unknown (as of 2026-04-07) Repository: https://github.com/minimistjs/minimist Security Contact: none listed Disclosure Policy: none listed Current Status: advisory-mapped

Audit History

| Date | Auditor | Scope | Methodology | Findings | Source | |------|---------|-------|-------------|----------|--------| | No public proactive audits on record yet. | — | — | — | — | — |

Known Vulnerabilities

| CVE / Issue | Severity | Description | Fixed in | Source | |-------------|----------|-------------|----------|--------| | CVE-2020-7598 | High | Prototype pollution via argument parsing | 1.2.3 / 0.2.1 | https://github.com/advisories/GHSA-vh95-rmgr-6w4m |

Security Posture Notes

  • Tiny package, huge blast radius because it sits in CLI parsing paths throughout the npm ecosystem.
  • Historically important because the bug class is simple, common, and widely propagated through transitive dependencies.
  • Public proof-of-concept material exists showing practical __proto__ and constructor.prototype payload exploitation, which makes minimist valuable as a teaching/example package for argument-parser risk.
  • High-value candidate for surface mapping beyond just known CVEs.

Dependencies of Note

  • Often appears as a transitive dependency in CLIs and build tools.
  • Especially important to track transitively because downstream consumers may not realize they are inheriting vulnerable parser behavior from tiny utility dependencies.

Open Questions

  • Which currently popular packages still pin vulnerable minimist versions transitively?
  • Has anyone published a modern full-source audit after the original prototype pollution fixes?
  • Are there parser edge cases beyond the known CVE lineage worth cataloging?
  • Which downstream exploit chains turn this parser flaw into practical command execution or environment tampering?

Related Pages

  • [[npm/index]]
  • [[npm/lodash]]
  • [[npm/semver]]

Last updated: 2026-04-07 | Sources: 2