CVE-2026-41242
Published: 18 April 2026
Summary
CVE-2026-41242 is a critical-severity Code Injection (CWE-94) vulnerability in Protobufjs Project Protobufjs. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 19.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires identification, reporting, and timely remediation of known flaws like CVE-2026-41242 by patching vulnerable protobufjs versions.
Mandates vulnerability scanning to detect presence of vulnerable protobufjs library versions affected by CVE-2026-41242.
Maintains inventory of system components, enabling identification of protobufjs usage and vulnerable instances targeted by CVE-2026-41242.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Code injection in protobufjs enables remote supply of malicious definitions to public-facing apps for RCE (T1190) with direct arbitrary JavaScript execution during decoding (T1059.007).
NVD Description
protobufjs compiles protobuf definitions into JavaScript (JS) functions. In versions prior to 8.0.1 and 7.5.5, attackers can inject arbitrary code in the "type" fields of protobuf definitions, which will then execute during object decoding using that definition. Versions 8.0.1 and…
more
7.5.5 patch the issue.
Deeper analysisAI
CVE-2026-41242 is a code injection vulnerability (CWE-94) in the protobufjs library, which compiles Protocol Buffers (protobuf) definitions into JavaScript functions. Versions prior to 8.0.1 and 7.5.5 are affected, allowing attackers to inject arbitrary code into the "type" fields of protobuf definitions. This code executes during object decoding when using the compromised definition, earning a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Remote attackers without authentication or user interaction can exploit this by supplying malicious protobuf definitions to applications using vulnerable protobufjs for decoding. Successful exploitation leads to arbitrary code execution on the target system, potentially resulting in full compromise with high confidentiality, integrity, and availability impacts.
Mitigation requires upgrading to protobufjs version 8.0.1 or 7.5.5, as detailed in the project's security advisory (GHSA-xq3m-2v4x-88gg) and corresponding release notes. Relevant patches are available in commits 535df444ac060243722ac5d672db205e5c531d75 and ff7b2afef8754837cc6dc64c864cd111ab477956.
Details
- CWE(s)