CVE-2026-41507 PUBLISHED

Remote Code Execution (RCE) via String Literal Injection into math-codegen

Assigner: GitHub_M
Reserved: 20.04.2026 Published: 08.05.2026 Updated: 08.05.2026

math-codegen generates code from mathematical expressions. Prior to version 0.4.3, string literal content passed to cg.parse() is injected verbatim into a new Function() body without sanitization. This allows an attacker to execute arbitrary system commands when user-controlled input reaches the parser. Any application exposing a math evaluation endpoint where user input flows into cg.parse() is vulnerable to full RCE. This issue has been patched in version 0.4.3.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 9.8

Product Status

Vendor mauriciopoppe
Product math-codegen
Versions
  • Version < 0.4.3 is affected

References

Problem Types

  • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE