CVE-2020-1037
Description
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge (HTML-based), aka 'Chakra Scripting Engine Memory Corruption Vulnerability'.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A remote code execution vulnerability in Chakra scripting engine (Microsoft Edge) due to memory corruption, exploitable via a malicious website.
CVE-2020-1037 is a remote code execution vulnerability in the Chakra scripting engine used by Microsoft Edge (HTML-based). The root cause is a memory corruption issue that arises when the engine improperly handles objects in memory [1]. This flaw allows an attacker to corrupt memory in a way that can lead to arbitrary code execution.
To exploit this vulnerability, an attacker would host a specially crafted website that triggers the memory corruption when visited by a user running an affected version of Microsoft Edge. No authentication or user interaction beyond visiting the site is required, making it a classic drive-by attack vector [1].
Successful exploitation grants the attacker the same user rights as the current user. If the user has administrative privileges, the attacker could take complete control of the system, install programs, view/change/delete data, or create new accounts [1].
Microsoft addressed this issue in a security update released in May 2020. The fix ensures that the JIT compiler bails out when an object is marked as temporary during an implicit call, preventing stack-stored objects from being used outside the function [3][4]. The open-source ChakraCore project also received a corresponding patch. Note that Microsoft ended security support for ChakraCore 1.11 on March 9, 2021, and the project is now community-maintained [2].
- NVD - CVE-2020-1037
- GitHub - chakra-core/ChakraCore: ChakraCore is an open source Javascript engine with a C API.
- ChakraCore Servicing Update for 2020.05B by rajeshpeter · Pull Request #6447 · chakra-core/ChakraCore
- [CVE-2020-1037] Ensure JIT bails out when there is an object marked a… · chakra-core/ChakraCore@73ced02
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Microsoft.ChakraCoreNuGet | < 1.11.19 | 1.11.19 |
Affected products
23- Microsoft/ChakraCorev5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 for 32-bit Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 for x64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1607 for 32-bit Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1607 for x64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1709 for 32-bit Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1709 for ARM64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1709 for x64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for 32-bit Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for ARM64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for x64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for 32-bit Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for ARM64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for x64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for 32-bit Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for ARM64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for x64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for 32-bit Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for ARM64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1909 for x64-based Systemsv5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows Server 2016v5Range: unspecified
- Microsoft/Microsoft Edge (EdgeHTML-based) on Windows Server 2019v5Range: unspecified
Patches
173ced029e6a0[CVE-2020-1037] Ensure JIT bails out when there is an object marked as temporary during an implicit call, to prevent objects stored on the stack to be used outside of the function. This is done by preventing removal of the Bailout instruction for that case during the DeadStore pass of GlobOpt.
1 file changed · +2 −1
lib/Backend/GlobOptBailOut.cpp+2 −1 modified@@ -1204,7 +1204,8 @@ GlobOpt::IsImplicitCallBailOutCurrentlyNeeded(IR::Instr * instr, Value const * s NeedBailOnImplicitCallForLiveValues(block, isForwardPass) || NeedBailOnImplicitCallForCSE(block, isForwardPass) || NeedBailOnImplicitCallWithFieldOpts(block->loop, hasLiveFields) || - NeedBailOnImplicitCallForArrayCheckHoist(block, isForwardPass) + NeedBailOnImplicitCallForArrayCheckHoist(block, isForwardPass) || + (instr->HasBailOutInfo() && (instr->GetBailOutKind() & IR::BailOutMarkTempObject) != 0) ) && (!instr->HasTypeCheckBailOut() && MayNeedBailOnImplicitCall(instr, src1Val, src2Val))) {
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-8xv4-c7rq-j577ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-1037ghsaADVISORY
- github.com/chakra-core/ChakraCore/commit/73ced029e6a06fcce9fd8c886dc73e5290f2ae69ghsaWEB
- github.com/chakra-core/ChakraCore/pull/6447ghsaWEB
- portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1037ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.