| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xq3m-2v4x-88gg | Arbitrary code execution in protobufjs |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 20 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Protobuf
Protobuf protobuf |
|
| Vendors & Products |
Protobuf
Protobuf protobuf |
Sat, 18 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | protobufjs compiles protobuf definitions into JavaScript (JS) functions. In versions prior to 8.0.1 and 7.5.5, attackers can inject arbitrary code in the "type" fields of protobuf definitions, which will then execute during object decoding using that definition. Versions 8.0.1 and 7.5.5 patch the issue. | |
| Title | protobufjs has an arbitrary code execution issue | |
| Weaknesses | CWE-94 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-20T16:03:57.689Z
Reserved: 2026-04-18T03:47:03.135Z
Link: CVE-2026-41242
Updated: 2026-04-20T16:03:52.059Z
Status : Awaiting Analysis
Published: 2026-04-18T17:16:13.983
Modified: 2026-04-20T19:03:07.607
Link: CVE-2026-41242
No data.
OpenCVE Enrichment
Updated: 2026-04-20T14:45:08Z
Github GHSA