CVE-2026-32304 PUBLISHED

Locutus: RCE via unsanitized input in create_function()

Assigner: GitHub_M
Reserved: 11.03.2026 Published: 12.03.2026 Updated: 13.03.2026

Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to 3.0.14, the create_function(args, code) function passes both parameters directly to the Function constructor without any sanitization, allowing arbitrary code execution. This is distinct from CVE-2026-29091 which was call_user_func_array using eval() in v2.x. This finding affects create_function using new Function() in v3.x. This vulnerability is fixed in 3.0.14.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 9.8

Product Status

Vendor locutusjs
Product locutus
Versions
  • Version < 3.0.14 is affected

References

Problem Types

  • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE