Ad

CVE-2026-29091

HIGH CVSS 3.1: 8.1 EPSS 0.48%
Updated Mar 13, 2026
Locutus
Parameter Value
CVSS 8.1 (HIGH)
Affected Versions before 3.0.0
Fixed In 3.0.0
Type CWE-95
Vendor Locutus
Public PoC No

Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to version 3.0.0, a remote code execution (RCE) flaw was discovered in the locutus project, specifically within the call_user_func_array function implementation. The vulnerability allows an attacker to inject arbitrary JavaScript code into the application's runtime environment.

This issue stems from an insecure implementation of the call_user_func_array function (and its wrapper call_user_func), which fails to properly validate all components of a callback array before passing them to eval(). This issue has been patched in version 3.0.0.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
High
Difficult to exploit
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Weakness Type (CWE)

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Locutus Locutus
cpe:2.3:a:locutus:locutus:*:*:*:*:*:node.js:*:*
3.0.0

Related Vulnerabilities