Home

Description

protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs generated JavaScript for toObject conversion could include an unsafe expression derived from a schema-controlled bytes field default value. A crafted descriptor with a non-string default value for a bytes field could cause attacker-controlled code to be emitted into the generated conversion function. This vulnerability is fixed in 7.5.6 and 8.0.2.

PUBLISHED Reserved 2026-05-05 | Published 2026-05-13 | Updated 2026-05-14 | Assigner GitHub_M




HIGH: 7.7CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

< 7.5.6
affected

>= 8.0.0, < 8.0.2
affected

References

github.com/...buf.js/security/advisories/GHSA-66ff-xgx4-vchm

cve.org (CVE-2026-44293)

nvd.nist.gov (CVE-2026-44293)

Download JSON