Home

Description

lwjson 1.8.1 contains an improper input validation vulnerability in the streaming JSON parser (lwjson_stream.c). The end-of-string detection logic incorrectly identifies escaped quote characters by only checking the immediately preceding character rather than counting consecutive backslashes, causing valid JSON strings ending with an escaped backslash (like "\\") to never terminate parsing. A remote attacker can send well-formed JSON to cause applications using lwjson_stream_parse() to hang indefinitely, resulting in denial of service.

PUBLISHED Reserved 2026-03-04 | Published 2026-05-08 | Updated 2026-05-08 | Assigner mitre

References

gist.github.com/dwilliams27/b99fd41be5d6848691797042cbfc1103 exploit

github.com/MaJerle/lwjson/tree/develop

github.com/...blob/develop/lwjson/src/lwjson/lwjson_stream.c

gist.github.com/dwilliams27/b99fd41be5d6848691797042cbfc1103

cve.org (CVE-2026-29975)

nvd.nist.gov (CVE-2026-29975)

Download JSON