CVE-2026-44295: Code Injection in protobuf.js 2.x
Plattform
nodejs
Komponente
protobufjs
Behoben in
2.0.2
CVE-2026-44295 affects versions 2.0.0 through 2.0.1 of protobuf.js, a JavaScript library for encoding and decoding data structures. This vulnerability allows an attacker to inject malicious JavaScript code by crafting a malicious schema or JSON descriptor. The vulnerability is fixed in version 2.0.2 and users are strongly advised to upgrade immediately to prevent potential code execution.
Auswirkungen und Angriffsszenarien
The core of the vulnerability lies in the static code generation process within protobuf.js. When generating JavaScript code from a protobuf schema, the library fails to adequately sanitize names used for namespaces, enums, services, and derived types. An attacker can craft a malicious schema containing specially designed names that, when processed by pbjs, result in the generation of JavaScript code containing arbitrary commands. This injected code will execute within the context of the application using protobuf.js, potentially granting the attacker full control over the affected system. The blast radius extends to any application relying on protobuf.js for data serialization and deserialization, particularly those handling untrusted input.
Ausnutzungskontext
CVE-2026-44295 was published on May 13, 2026. Its severity is rated HIGH (CVSS 8.7). Currently, there are no publicly known Proof-of-Concept (POC) exploits. The vulnerability is not listed on KEV or EPSS, suggesting a low to medium probability of exploitation. Monitor security advisories and threat intelligence feeds for updates.
Bedrohungsanalyse
Exploit-Status
CISA SSVC
CVSS-Vektor
Was bedeuten diese Metriken?
- Attack Vector
- Netzwerk — aus der Ferne über das Internet ausnutzbar. Kein physischer oder lokaler Zugriff erforderlich.
- Attack Complexity
- Niedrig — keine besonderen Bedingungen erforderlich. Zuverlässig ausnutzbar.
- Privileges Required
- Niedrig — jedes gültige Benutzerkonto ist ausreichend.
- User Interaction
- Erforderlich — Opfer muss eine Datei öffnen, auf einen Link klicken oder eine Seite besuchen.
- Scope
- Geändert — Angriff kann über die anfällige Komponente hinaus auf andere Systeme übergreifen.
- Confidentiality
- Hoch — vollständiger Vertraulichkeitsverlust. Angreifer kann alle Daten lesen.
- Integrity
- Hoch — Angreifer kann beliebige Daten schreiben, ändern oder löschen.
- Availability
- Keine — kein Verfügbarkeitseinfluss.
Betroffene Software
Schwachstellen-Klassifikation (CWE)
Zeitleiste
- Reserviert
- Veröffentlicht
Mitigation und Workarounds
The primary mitigation is to upgrade to protobuf.js version 2.0.2 or later, which includes the necessary sanitization fixes. If upgrading is not immediately feasible, consider implementing input validation on protobuf schemas before processing them with pbjs. While not a complete solution, this can help prevent the injection of malicious names. Web Application Firewalls (WAFs) configured to inspect generated JavaScript code might be able to detect and block attempts to exploit this vulnerability, but this is highly dependent on the WAF's capabilities and signature coverage. There are no specific Sigma or YARA rules available at this time, but monitoring for unusual JavaScript code generation patterns is recommended.
So behebenwird übersetzt…
Actualice la biblioteca protobuf.js a la versión 2.0.2 o superior, o a la versión 1.2.1 o superior si está utilizando una versión anterior a 2.0.0. Esto solucionará la vulnerabilidad de inyección de código al sanear correctamente los nombres de los esquemas.
Häufig gestellte Fragen
What is CVE-2026-44295 — Code Injection in protobuf.js?
CVE-2026-44295 is a HIGH severity vulnerability in protobuf.js versions 2.0.0–2.0.1 that allows attackers to inject malicious JavaScript code through crafted protobuf schemas, potentially leading to remote code execution.
Am I affected by CVE-2026-44295 in protobuf.js?
You are affected if you are using protobuf.js versions 2.0.0 through 2.0.1. Verify your version using npm list protobuf.js or similar package management tools.
How do I fix CVE-2026-44295 in protobuf.js?
Upgrade to protobuf.js version 2.0.2 or later to resolve the vulnerability. If immediate upgrade is not possible, implement strict input validation on protobuf schemas.
Is CVE-2026-44295 being actively exploited?
Currently, there are no publicly known active exploits, but the vulnerability's severity warrants immediate attention and mitigation.
Where can I find the official protobuf.js advisory for CVE-2026-44295?
Refer to the official protobuf.js GitHub repository and related security advisories for the most up-to-date information: [https://github.com/protocolbuffers/protobufjs](https://github.com/protocolbuffers/protobufjs)
Ist dein Projekt betroffen?
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Jetzt testen — kein Konto
Laden Sie ein Manifest hoch (composer.lock, package-lock.json, WordPress Plugin-Liste…) oder fügen Sie Ihre Komponentenliste ein. Sie erhalten sofort einen Schwachstellenbericht. Das Hochladen einer Datei ist nur der Anfang: Mit einem Konto erhalten Sie kontinuierliche Überwachung, Slack/email-Benachrichtigungen, Multi-Projekt- und White-Label-Berichte.
Abhängigkeitsdatei hier ablegen
composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...