CVE-2026-1245

A code injection vulnerability in the binary-parser library prior to version 2.3.0 allows arbitrary JavaScript code execution when untrusted values are used in parser field names or encoding parameters. The library directly interpolates these values into dynamically generated code without sanitization, enabling attackers to execute arbitrary code in the context of the Node.js process.
Configurations

Configuration 1 (hide)

cpe:2.3:a:keichi:binary-parser:*:*:*:*:*:node.js:*:*

History

03 Feb 2026, 21:41

Type Values Removed Values Added
CWE CWE-94
CPE cpe:2.3:a:keichi:binary-parser:*:*:*:*:*:node.js:*:*
References () https://github.com/keichi/binary-parser - () https://github.com/keichi/binary-parser - Product
References () https://github.com/keichi/binary-parser/pull/283 - () https://github.com/keichi/binary-parser/pull/283 - Patch
References () https://kb.cert.org/vuls/id/102648 - () https://kb.cert.org/vuls/id/102648 - Third Party Advisory
References () https://www.npmjs.com/package/binary-parser - () https://www.npmjs.com/package/binary-parser - Product
References () https://www.kb.cert.org/vuls/id/102648 - () https://www.kb.cert.org/vuls/id/102648 - Third Party Advisory
First Time Keichi
Keichi binary-parser

Information

Published : 2026-01-20 19:15

Updated : 2026-02-03 21:41


NVD link : CVE-2026-1245

Mitre link : CVE-2026-1245

CVE.ORG link : CVE-2026-1245


JSON object : View

Products Affected

keichi

  • binary-parser
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')