Home

Description

math-codegen generates code from mathematical expressions. Prior to version 0.4.3, string literal content passed to cg.parse() is injected verbatim into a new Function() body without sanitization. This allows an attacker to execute arbitrary system commands when user-controlled input reaches the parser. Any application exposing a math evaluation endpoint where user input flows into cg.parse() is vulnerable to full RCE. This issue has been patched in version 0.4.3.

PUBLISHED Reserved 2026-04-20 | Published 2026-05-08 | Updated 2026-05-08 | Assigner GitHub_M




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

< 0.4.3
affected

References

github.com/...odegen/security/advisories/GHSA-p6x5-p4xf-cc4r

github.com/mauriciopoppe/math-codegen/pull/11

github.com/...ommit/4bb52d3030683362b3559ee8dd91350555a05f6b

cve.org (CVE-2026-41507)

nvd.nist.gov (CVE-2026-41507)

Download JSON