A code injection vulnerability in the binary-parser library prior to version 2.3.0 allows arbitrary JavaScript code execution when untrusted values are used in parser field names or encoding parameters. The library directly interpolates these values into dynamically generated code without sanitization, enabling attackers to execute arbitrary code in the context of the Node.js process.
History

Wed, 21 Jan 2026 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Keichi
Keichi binary-parser
Vendors & Products Keichi
Keichi binary-parser

Tue, 20 Jan 2026 23:30:00 +0000


Tue, 20 Jan 2026 21:30:00 +0000

Type Values Removed Values Added
References

Tue, 20 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Description A code injection vulnerability in the binary-parser library prior to version 2.3.0 allows arbitrary JavaScript code execution when untrusted values are used in parser field names or encoding parameters. The library directly interpolates these values into dynamically generated code without sanitization, enabling attackers to execute arbitrary code in the context of the Node.js process.
Title CVE-2026-1245
References

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2026-01-20T23:09:15.605Z

Reserved: 2026-01-20T18:48:57.730Z

Link: CVE-2026-1245

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-20T19:15:50.573

Modified: 2026-01-21T00:15:52.310

Link: CVE-2026-1245

cve-icon Redhat

No data.