CVE-2026-29091
Published: 06 March 2026
Description
Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to version 3.0.0, a remote code execution (RCE) flaw was discovered in the locutus project, specifically within the call_user_func_array function implementation. The vulnerability allows an attacker to…
more
inject arbitrary JavaScript code into the application's runtime environment. This issue stems from an insecure implementation of the call_user_func_array function (and its wrapper call_user_func), which fails to properly validate all components of a callback array before passing them to eval(). This issue has been patched in version 3.0.0.
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the RCE flaw in Locutus by requiring timely identification, reporting, and correction through upgrading to version 3.0.0 or later.
Requires validation of untrusted inputs such as callback arrays to prevent improper neutralization and subsequent injection into eval().
Enforces secure configuration settings for software libraries like Locutus, ensuring only patched versions are deployed to mitigate the vulnerability.
Security SummaryAI
CVE-2026-29091 is a remote code execution (RCE) vulnerability in the Locutus project, a JavaScript library that ports standard libraries from other programming languages for educational purposes. The flaw affects versions prior to 3.0.0 and resides in the implementation of the call_user_func_array function and its wrapper call_user_func. Due to insufficient validation of callback array components, the functions pass untrusted input directly to eval(), enabling arbitrary JavaScript code injection into the application's runtime environment. The issue is rated with a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code).
A remote attacker without privileges can exploit this vulnerability over the network by supplying a specially crafted callback array to the affected functions. Exploitation requires high attack complexity but no user interaction. Successful exploitation grants the attacker the ability to execute arbitrary JavaScript code within the application's runtime, potentially leading to high confidentiality, integrity, and availability impacts, such as data theft, modification, or denial of service.
The vulnerability has been patched in Locutus version 3.0.0, as detailed in the project's GitHub security advisory (GHSA-fp25-p6mj-qqg6) and the specific commit (977a1fb169441e35996a1d2465b512322de500ad). Security practitioners should upgrade to version 3.0.0 or later to mitigate the issue.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2026-29091 is a network-accessible (AV:N/PR:N) RCE vulnerability exploitable without privileges or user interaction, directly mapping to exploitation of public-facing applications.