A code injection vulnerability in the binary-parser library prior to version 2.3.0 allows arbitrary JavaScript code execution when untrusted values are used in parser field names or encoding parameters. The library directly interpolates these values into dynamically generated code without sanitization, enabling attackers to execute arbitrary code in the context of the Node.js process.
Metrics
Affected Vendors & Products
References
History
Wed, 21 Jan 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Keichi
Keichi binary-parser |
|
| Vendors & Products |
Keichi
Keichi binary-parser |
Tue, 20 Jan 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 20 Jan 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 20 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A code injection vulnerability in the binary-parser library prior to version 2.3.0 allows arbitrary JavaScript code execution when untrusted values are used in parser field names or encoding parameters. The library directly interpolates these values into dynamically generated code without sanitization, enabling attackers to execute arbitrary code in the context of the Node.js process. | |
| Title | CVE-2026-1245 | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published: 2026-01-20T18:50:34.232Z
Updated: 2026-01-20T23:09:15.605Z
Reserved: 2026-01-20T18:48:57.730Z
Link: CVE-2026-1245
No data.
Status : Received
Published: 2026-01-20T19:15:50.573
Modified: 2026-01-21T00:15:52.310
Link: CVE-2026-1245
No data.