CVE-2026-44293 PUBLISHED

protobufjs: Code injection through bytes field defaults in generated toObject code

Assigner: GitHub_M
Reserved: 05.05.2026 Published: 13.05.2026 Updated: 13.05.2026

protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs generated JavaScript for toObject conversion could include an unsafe expression derived from a schema-controlled bytes field default value. A crafted descriptor with a non-string default value for a bytes field could cause attacker-controlled code to be emitted into the generated conversion function. This vulnerability is fixed in 7.5.6 and 8.0.2.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 7.7

Product Status

Vendor protobufjs
Product protobuf.js
Versions
  • Version < 7.5.6 is affected
  • Version >= 8.0.0, < 8.0.2 is affected

References

Problem Types

  • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE