Moderate severityOSV Advisory· Published Jan 20, 2026· Updated Jan 21, 2026
CVE-2026-1245
CVE-2026-1245
Description
A code injection vulnerability in the binary-parser library prior to version 2.3.0 allows arbitrary JavaScript code execution when untrusted values are used in parser field names or encoding parameters. The library directly interpolates these values into dynamically generated code without sanitization, enabling attackers to execute arbitrary code in the context of the Node.js process.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
binary-parsernpm | < 2.3.0 | 2.3.0 |
Affected products
1- Range: 0.0.1, 0.0.2, 0.0.3, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-m39p-34qh-rh3wghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-1245ghsaADVISORY
- github.com/keichi/binary-parser/pull/283ghsaWEB
- kb.cert.org/vuls/id/102648ghsaWEB
- www.cve.org/CVERecordghsaWEB
- www.kb.cert.org/vuls/id/102648ghsaWEB
- www.npmjs.com/package/binary-parserghsaWEB
News mentions
0No linked articles in our index yet.