CVE-2026-44295 - Vulnerability Analysis
HighCVSS: 8.7Last Updated: May 13, 2026
protobufjs-cli - Template Injection
Overview
protobufjs-cli < 1.2.1 and < 2.0.2 contains a code injection vulnerability caused by insufficient sanitization of schema-controlled names in static code generation, letting attackers inject unsafe JavaScript identifiers, exploit requires crafted schema or JSON descriptor.
Severity & Score
Impact
Attackers can inject unsafe JavaScript identifiers, potentially leading to code execution or logic manipulation in generated code.
Mitigation
Update to versions 1.2.1 or 2.0.2 or later.
Social Media Activity(2 posts)
š CVE-2026-44295 - High (8.7) protobufjs-cli is the command line add-on for protobuf.js. Prior to 1.2.1 and 2.0.2, pbjs static code generation could emit unsafe JavaScript identifiers derived from schema-controlled names. When generating static JavaScript from a crafted schema... š https://www.thehackerwire.com/vulnerability/CVE-2026-44295/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-44295 - High (8.7) protobufjs-cli is the command line add-on for protobuf.js. Prior to 1.2.1 and 2.0.2, pbjs static code generation could emit unsafe JavaScript identifiers derived from schema-controlled names. When generating static JavaScript from a crafted schema... š https://www.thehackerwire.com/vulnerability/CVE-2026-44295/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-44295
- Severity
- High
- CVSS Score
- 8.7
- Type
- template_injection
- Status
- unconfirmed
- EPSS
- 3.2%
- Social Posts
- 2
CWE
- CWE-94
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N