Логотип exploitDog
bind:CVE-2026-32304
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-32304

Количество 3

Количество 3

redhat логотип

CVE-2026-32304

15 дней назад

A flaw was found in Locutus, a JavaScript library that provides standard library functions. The `create_function` function in Locutus passes user-supplied arguments and code directly to the JavaScript `Function` constructor without proper sanitization. This vulnerability allows a remote attacker to execute arbitrary code within the application, potentially leading to full system compromise or data manipulation.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2026-32304

14 дней назад

Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to 3.0.14, the create_function(args, code) function passes both parameters directly to the Function constructor without any sanitization, allowing arbitrary code execution. This is distinct from CVE-2026-29091 which was call_user_func_array using eval() in v2.x. This finding affects create_function using new Function() in v3.x. This vulnerability is fixed in 3.0.14.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-vh9h-29pq-r5m8

14 дней назад

Locutus vulnerable to RCE via unsanitized input in create_function()

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2026-32304

A flaw was found in Locutus, a JavaScript library that provides standard library functions. The `create_function` function in Locutus passes user-supplied arguments and code directly to the JavaScript `Function` constructor without proper sanitization. This vulnerability allows a remote attacker to execute arbitrary code within the application, potentially leading to full system compromise or data manipulation.

CVSS3: 7.5
0%
Низкий
15 дней назад
nvd логотип
CVE-2026-32304

Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to 3.0.14, the create_function(args, code) function passes both parameters directly to the Function constructor without any sanitization, allowing arbitrary code execution. This is distinct from CVE-2026-29091 which was call_user_func_array using eval() in v2.x. This finding affects create_function using new Function() in v3.x. This vulnerability is fixed in 3.0.14.

CVSS3: 9.8
0%
Низкий
14 дней назад
github логотип
GHSA-vh9h-29pq-r5m8

Locutus vulnerable to RCE via unsanitized input in create_function()

CVSS3: 9.8
0%
Низкий
14 дней назад

Уязвимостей на страницу