Ad

CVE-2026-29091

HIGH CVSS 3.1: 8.1
Updated Mar 06, 2026
Locutus
Parameter Value
CVSS 8.1 (HIGH)
Fixed In 3.0.0
Type CWE-95
Vendor Locutus
Public PoC No

Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to version 3.0.0, a remote code execution (RCE) flaw was discovered in the locutus project, specifically within the call_user_func_array function implementation. The vulnerability allows an attacker to inject arbitrary JavaScript code into the application's runtime environment.

This issue stems from an insecure implementation of the call_user_func_array function (and its wrapper call_user_func), which fails to properly validate all components of a callback array before passing them to eval(). This issue has been patched in version 3.0.0.

Attack Parameters

Attack Vector
Network
Атака возможна удалённо
Attack Complexity
High
Сложно эксплуатировать
Privileges Required
None
Права не нужны
User Interaction
None
Не нужно действие пользователя

Impact Assessment

Confidentiality
High
Полная утечка данных
Integrity
High
Полная модификация данных
Availability
High
Полный отказ в обслуживании

CVSS Vector v3.1

Weakness Type (CWE)