Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f456-rf33-4626

Опубликовано: 22 янв. 2026
Источник: github
Github: Прошло ревью
CVSS4: 7.7

Описание

Orval Mock Generation Code Injection via const

I am reporting a code injection vulnerability in Orval’s mock generation pipeline affecting @orval/mock in both the 7.x and 8.x series. This issue is related in impact to the previously reported enum x-enumDescriptions (https://github.com/advisories/GHSA-h526-wf6g-67jv), but it affects a different code path in the faker-based mock generator rather than @orval/core.

The vulnerability allows untrusted OpenAPI specifications to inject arbitrary TypeScript/JavaScript into generated mock files via the const keyword on schema properties. These const values are interpolated into the mock scalar generator (getMockScalar in packages/mock/src/faker/getters/scalar.ts) without proper escaping or type-safe serialization, which results in attacker-controlled code being emitted into both interface definitions and faker/MSW handlers. I have confirmed that this occurs on orval@7.19.0 and orval@8.0.2 with mock: true, and that the generated mocks contain executable payloads such as require('child_process').execSync('id') in the output TypeScript.

openapi: 3.1.0 info: title: Mock Const Injection PoC version: 1.0.0 paths: /test: get: operationId: getTests responses: '200': description: OK content: application/json: schema: $ref: '#/components/schemas/Tests' components: schemas: Tests: type: object properties: EvilString: type: string const: "'); require('child_process').execSync('id'); //" EvilNumber: type: number const: "0); require('child_process').execSync('id'); //" SafeEnum: type: string enum: ["test"]

Пакеты

Наименование

@orval/mock

npm
Затронутые версииВерсия исправления

< 7.20.0

7.20.0

Наименование

@orval/mock

npm
Затронутые версииВерсия исправления

>= 8.0.0-rc.0, < 8.0.3

8.0.3

EPSS

Процентиль: 27%
0.00094
Низкий

7.7 High

CVSS4

Дефекты

CWE-77

Связанные уязвимости

nvd
15 дней назад

Orval generates type-safe JS clients (TypeScript) from any valid OpenAPI v3 or Swagger v2 specification. Versions 7.19.0 and below and 8.0.0-rc.0 through 8.0.2 allow untrusted OpenAPI specifications to inject arbitrary TypeScript/JavaScript into generated mock files via the const keyword on schema properties. These const values are interpolated into the mock scalar generator (getMockScalar in packages/mock/src/faker/getters/scalar.ts) without proper escaping or type-safe serialization, which results in attacker-controlled code being emitted into both interface definitions and faker/MSW handlers. The vulnerability is similar in impact to the previously reported enum x-enumDescriptions (GHSA-h526-wf6g-67jv), but it affects a different code path in the faker-based mock generator rather than @orval/core. The issue has been fixed in versions 7.20.0 and 8.0.3.

EPSS

Процентиль: 27%
0.00094
Низкий

7.7 High

CVSS4

Дефекты

CWE-77