Medium severity5.3GHSA Advisory· Published May 13, 2026· Updated May 13, 2026
CVE-2026-44288
CVE-2026-44288
Description
protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs includes a minimal UTF-8 decoder that accepted overlong UTF-8 byte sequences and decoded them to their canonical characters instead of replacing them. An attacker who can provide protobuf binary data decoded through the affected UTF-8 path may be able to bypass application-level checks that inspect raw bytes before protobuf string decoding. For example, bytes that do not contain certain ASCII characters could decode to strings containing those characters. This vulnerability is fixed in 7.5.6 and 8.0.2.
Affected products
1- Range: <= 1.1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-q6x5-8v7m-xcrfghsaADVISORY
- github.com/protobufjs/protobuf.js/releases/tag/protobufjs-v7.5.6ghsa
- github.com/protobufjs/protobuf.js/releases/tag/protobufjs-v8.0.2ghsa
- github.com/protobufjs/protobuf.js/security/advisories/GHSA-q6x5-8v7m-xcrfnvd
- nvd.nist.gov/vuln/detail/CVE-2026-44288ghsa
News mentions
0No linked articles in our index yet.