protobufjs compiles protobuf definitions into JavaScript (JS) functions. In versions prior to 8.0.1 and 7.5.5, attackers can inject arbitrary code in the "type" fields of protobuf definitions, which will then execute during object decoding using that definition. Versions 8.0.1 and 7.5.5 patch the issue.
Project Subscriptions
No data.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xq3m-2v4x-88gg | Arbitrary code execution in protobufjs |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 18 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | protobufjs compiles protobuf definitions into JavaScript (JS) functions. In versions prior to 8.0.1 and 7.5.5, attackers can inject arbitrary code in the "type" fields of protobuf definitions, which will then execute during object decoding using that definition. Versions 8.0.1 and 7.5.5 patch the issue. | |
| Title | protobufjs has an arbitrary code execution issue | |
| Weaknesses | CWE-94 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-18T16:18:10.652Z
Reserved: 2026-04-18T03:47:03.135Z
Link: CVE-2026-41242
No data.
Status : Received
Published: 2026-04-18T17:16:13.983
Modified: 2026-04-18T17:16:13.983
Link: CVE-2026-41242
No data.
OpenCVE Enrichment
Updated: 2026-04-18T20:15:09Z
Weaknesses
Github GHSA