Cyber Posture

CVE-2026-26974

Critical

Published: 20 February 2026

Published
20 February 2026
Modified
02 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 10.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26974 is a critical-severity Inclusion of Functionality from Untrusted Control Sphere (CWE-829) vulnerability in Slyde.Js Slyde. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Compromise Software Dependencies and Development Tools (T1195.001); ranked at the 10.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 CM-11 (User-installed Software) and SA-12 (Supply Chain Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Compromise Software Dependencies and Development Tools (T1195.001) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces supply chain protections to mitigate risks from malicious npm packages that exploit automatic loading of .plugin.js files for arbitrary code execution.

prevent

Restricts user-installed software to prevent installation of untrusted node_modules packages containing malicious plugins that auto-execute on import.

preventdetect

Deploys malicious code protection mechanisms to scan for and block arbitrary code execution from automatically imported plugin files in node_modules.

MITRE ATT&CK Enterprise TechniquesAI

T1195.001 Compromise Software Dependencies and Development Tools Initial Access
Adversaries may manipulate software dependencies and development tools prior to receipt by a final consumer for the purpose of data or system compromise.
T1195.002 Compromise Software Supply Chain Initial Access
Adversaries may manipulate application software prior to receipt by a final consumer for the purpose of data or system compromise.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Vulnerability enables supply-chain attacks by allowing arbitrary JavaScript execution from any malicious npm package containing .plugin.js files in node_modules, directly mapping to compromise of software dependencies and Node.js script execution upon install or load.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Slyde is a program that creates animated presentations from XML. In versions 0.0.4 and below, Node.js automatically imports **/*.plugin.{js,mjs} files including those from node_modules, so any malicious package with a .plugin.js file can execute arbitrary code when installed or required.…

more

All projects using this loading behavior are affected, especially those installing untrusted packages. This issue has been fixed in version 0.0.5. To workaround this issue, users can audit and restrict which packages are installed in node_modules.

Deeper analysisAI

CVE-2026-26974 is a critical vulnerability (CVSS 9.8) affecting Slyde, a Node.js program for creating animated presentations from XML, in versions 0.0.4 and below. The issue stems from Node.js automatically importing all **/*.plugin.{js,mjs} files, including those within node_modules directories. This allows any malicious npm package containing a .plugin.js or .plugin.mjs file to execute arbitrary code upon installation or when required by the application. All projects relying on this automatic plugin loading behavior are vulnerable, particularly those that install untrusted packages from public registries.

Remote attackers require no privileges, authentication, or user interaction to exploit this vulnerability, enabling supply-chain attacks via malicious packages. By publishing or tricking users into installing a crafted package with a plugin file, attackers can achieve arbitrary code execution on the victim's system, potentially leading to full compromise with high confidentiality, integrity, and availability impacts as scored by CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The root cause aligns with CWE-829 (Inclusion of Functionality from Untrusted Control Sphere).

The vulnerability has been fixed in Slyde version 0.0.5, as detailed in the project's GitHub security advisory (GHSA-w7h5-55jg-cq2f), release notes, and the patching commit. As a workaround, users should audit node_modules contents and restrict installations to trusted packages only.

Details

CWE(s)

Affected Products

slyde.js
slyde
≤ 0.0.5

CVEs Like This One

CVE-2025-27607Shared CWE-829
CVE-2025-27510Shared CWE-829
CVE-2026-43569Shared CWE-829
CVE-2025-0982Shared CWE-829
CVE-2026-1699Shared CWE-829
CVE-2026-40313Shared CWE-829
CVE-2026-22816Shared CWE-829
CVE-2026-28372Shared CWE-829
CVE-2026-4295Shared CWE-829
CVE-2025-62726Shared CWE-829

References