This affects the package js-ini before 1.3.0. If an attacker submits a malicious INI file to an application that parses it with parse , they will pollute the prototype on the application. This can be exploited further depending on the context.
https://security.snyk.io/vuln/SNYK-JS-JSINI-1048970
https://github.com/Sdju/js-ini/commit/fa17efb7e3a7c9464508a254838d4c231784931e