High severity7.5GHSA Advisory· Published May 13, 2026· Updated May 13, 2026
CVE-2026-44289
CVE-2026-44289
Description
protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs could recurse without a depth limit while decoding nested protobuf data. This affected both skipping unknown group fields and generated decoding of nested message fields. A crafted protobuf binary payload could cause the JavaScript call stack to be exhausted during decoding. This vulnerability is fixed in 7.5.6 and 8.0.2.
Affected products
2- Range: >= 8.0.0, <= 8.0.1
- cpe:2.3:a:protobufjs_project:protobufjs:*:*:*:*:*:node.js:*:*Range: <7.5.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-685m-2w69-288qghsaADVISORY
- github.com/protobufjs/protobuf.js/security/advisories/GHSA-685m-2w69-288qnvdMitigationVendor Advisory
- github.com/protobufjs/protobuf.js/releases/tag/protobufjs-v7.5.6ghsa
- github.com/protobufjs/protobuf.js/releases/tag/protobufjs-v8.0.2ghsa
- nvd.nist.gov/vuln/detail/CVE-2026-44289ghsa
News mentions
0No linked articles in our index yet.