Home

Description

jq is a command-line JSON processor. In 1.8.1 and earlier, Top-level jq programs loaded from a file with -f are truncated at the first embedded NUL byte on current upstream HEAD. A crafted filter file such as . followed by \x00 and arbitrary suffix compiles and executes as only the prefix before the NUL. This leaves jq with a post-CVE-2026-33948 prefix/full-buffer mismatch on the compilation path even though the JSON parser path has already been fixed.

PUBLISHED Reserved 2026-04-18 | Published 2026-05-11 | Updated 2026-05-11 | Assigner GitHub_M




MEDIUM: 5.5CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

Problem types

CWE-158: Improper Neutralization of Null Byte or NUL Character

Product status

<= 1.8.1
affected

References

github.com/jqlang/jq/security/advisories/GHSA-vf2h-chrj-q3fg exploit

github.com/jqlang/jq/security/advisories/GHSA-vf2h-chrj-q3fg

cve.org (CVE-2026-41256)

nvd.nist.gov (CVE-2026-41256)

Download JSON