Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to 3.0.14, the create_function(args, code) function passes both parameters directly to the Function constructor without any sanitization, allowing arbitrary code execution. This is distinct from CVE-2026-29091 which was call_user_func_array using eval() in v2.x. This finding affects create_function using new Function() in v3.x. This vulnerability is fixed in 3.0.14.
References
| Link | Resource |
|---|---|
| https://github.com/locutusjs/locutus/releases/tag/v3.0.14 | Product Release Notes |
| https://github.com/locutusjs/locutus/security/advisories/GHSA-vh9h-29pq-r5m8 | Exploit Mitigation Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-13 19:54
Updated : 2026-03-19 13:48
NVD link : CVE-2026-32304
Mitre link : CVE-2026-32304
CVE.ORG link : CVE-2026-32304
JSON object : View
Products Affected
locutus
- locutus
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
