MEDIUMCVE-2026-5011CVSS 6.3

elecV2 elecV2P JSON webhook runJSFile injeção de código

Plataforma

nodejs

Componente

elecv2p

Corrigido em

3.8.1

3.8.2

3.8.3

3.8.4

AI Confidence: highNVDEPSS 0.0%Revisado: mai. de 2026
Traduzindo para o seu idioma…

CVE-2026-5011 describes a code injection vulnerability discovered in elecV2 and elecV2P versions 3.8.0 to 3.8.3. This flaw resides within the runJSFile function of the /webhook endpoint, specifically within the JSON Parser component. An attacker can exploit this by manipulating the rawcode argument, leading to arbitrary code execution. A public exploit is now available, highlighting the urgency of addressing this issue.

Impacto e Cenários de Ataquetraduzindo…

The vulnerability allows a remote attacker to inject and execute arbitrary code on a system running elecV2 or elecV2P. This could lead to complete system compromise, including data theft, modification, or deletion. Given the public availability of an exploit, the potential for widespread exploitation is high. The /webhook endpoint suggests this vulnerability could be exploited through external integrations or API calls, expanding the attack surface. Successful exploitation could also allow for lateral movement within the network if the affected system has access to other sensitive resources.

Contexto de Exploraçãotraduzindo…

This vulnerability is considered actively exploitable due to the public availability of a proof-of-concept. It was disclosed on 2026-03-28. The project maintainers have not yet responded to the issue report, increasing the risk. While not currently listed on CISA KEV, its public exploit status warrants close monitoring. The ease of exploitation suggests a potentially high probability of widespread attacks.

Quem Está em Riscotraduzindo…

Organizations utilizing elecV2 or elecV2P in production environments, particularly those with external integrations or API endpoints that interact with the /webhook functionality, are at significant risk. Systems with weak input validation or lacking WAF protection are especially vulnerable. Shared hosting environments where multiple users share the same server instance are also at increased risk, as a compromise of one user's instance could potentially affect others.

Passos de Detecçãotraduzindo…

• nodejs: Monitor process execution for unusual JavaScript code being run. Use ps aux | grep node to identify processes running elecV2/elecV2P. Check for suspicious network connections originating from the affected processes using netstat -anp | grep elecV2.

ps aux | grep elecV2

• generic web: Examine access logs for requests to /webhook with unusual or excessively long rawcode parameters. Look for POST requests containing JavaScript code in the request body.

grep '/webhook' access.log | grep -i javascript

Linha do Tempo do Ataque

  1. Disclosure

    disclosure

Inteligência de Ameaças

Status do Exploit

Prova de ConceitoDesconhecido
CISA KEVNO
Exposição na InternetAlta

EPSS

0.05% (percentil 15%)

CISA SSVC

Exploraçãopoc
Automatizávelno
Impacto Técnicopartial

Vetor CVSS

INTELIGÊNCIA DE AMEAÇAS· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R6.3MEDIUMAttack VectorNetworkComo o atacante alcança o alvoAttack ComplexityLowCondições necessárias para explorarPrivileges RequiredLowNível de autenticação necessárioUser InteractionNoneSe a vítima precisa tomar uma açãoScopeUnchangedImpacto além do componente afetadoConfidentialityLowRisco de exposição de dados sensíveisIntegrityLowRisco de modificação não autorizada de dadosAvailabilityLowRisco de interrupção de serviçonextguardhq.com · Pontuação Base CVSS v3.1
O que significam essas métricas?
Attack Vector
Rede — explorável remotamente pela internet. Sem acesso físico ou local necessário.
Attack Complexity
Baixa — sem condições especiais. O atacante pode explorar de forma confiável.
Privileges Required
Baixo — qualquer conta de usuário válida é suficiente.
User Interaction
Nenhuma — ataque automático e silencioso. A vítima não faz nada.
Scope
Inalterado — impacto limitado ao componente vulnerável.
Confidentiality
Baixo — acesso parcial ou indireto a alguns dados.
Integrity
Baixo — o atacante pode modificar alguns dados com alcance limitado.
Availability
Baixo — negação de serviço parcial ou intermitente.

Software Afetado

Componenteelecv2p
FornecedorelecV2
Faixa afetadaCorrigido em
3.8.0 – 3.8.03.8.1
3.8.1 – 3.8.13.8.2
3.8.2 – 3.8.23.8.3
3.8.3 – 3.8.33.8.4

Classificação de Fraqueza (CWE)

Linha do tempo

  1. Reservado
  2. Publicada
  3. Modificada
  4. EPSS atualizado
Sem correção — 57 dias desde a divulgação

Mitigação e Soluções Alternativastraduzindo…

The primary mitigation is to upgrade to a patched version of elecV2 or elecV2P. As of this writing, no patched version has been released. Until a patch is available, consider implementing temporary workarounds. Input validation on the /webhook endpoint is crucial; strictly validate and sanitize the rawcode argument to prevent malicious code injection. Implementing a Web Application Firewall (WAF) with rules to detect and block suspicious payloads targeting the /webhook endpoint can provide an additional layer of defense. Monitor system logs for unusual activity related to the /webhook endpoint and the JSON Parser component.

Como corrigir

Atualize elecV2 elecV2P para uma versão posterior a 3.8.3. Isso resolverá a vulnerabilidade de injeção de código na função runJSFile do arquivo /webhook.

Boletim de Segurança CVE

Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.

Perguntas frequentestraduzindo…

What is CVE-2026-5011 — Code Injection in elecV2 elecV2P?

CVE-2026-5011 is a code injection vulnerability affecting elecV2 and elecV2P versions 3.8.0 through 3.8.3. It allows attackers to execute arbitrary code by manipulating the 'rawcode' argument in the /webhook endpoint.

Am I affected by CVE-2026-5011 in elecV2 elecV2P?

You are affected if you are using elecV2 or elecV2P versions 3.8.0, 3.8.1, 3.8.2, or 3.8.3. Immediate action is required.

How do I fix CVE-2026-5011 in elecV2 elecV2P?

Upgrade to a patched version of elecV2 or elecV2P. As no patch is currently available, implement input validation and WAF rules as temporary mitigations.

Is CVE-2026-5011 being actively exploited?

Yes, a public exploit exists, indicating active exploitation is likely and poses an immediate threat.

Where can I find the official elecV2 advisory for CVE-2026-5011?

The project maintainers have not yet responded to the issue report. Monitor the project's website and GitHub repository for updates.

Seu projeto está afetado?

Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.