An issue in QuickJS-NG v.0.12.1 allows an attacker to execute arbitrary code via the js_mapped_arguments_mark function
History

Tue, 12 May 2026 16:30:00 +0000

Type Values Removed Values Added
Title Arbitrary Code Execution via js_mapped_arguments_mark in QuickJS‑NG

Tue, 12 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 22:45:00 +0000

Type Values Removed Values Added
Title Arbitrary Code Execution via js_mapped_arguments_mark in QuickJS‑NG
First Time appeared Quickjs-ng
Quickjs-ng quickjs
Weaknesses CWE-94
Vendors & Products Quickjs-ng
Quickjs-ng quickjs

Mon, 11 May 2026 20:45:00 +0000

Type Values Removed Values Added
Description An issue in QuickJS-NG v.0.12.1 allows an attacker to execute arbitrary code via the js_mapped_arguments_mark function
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-12T13:32:58.393Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-37630

cve-icon Vulnrichment

Updated: 2026-05-12T13:31:18.416Z

cve-icon NVD

Status : Deferred

Published: 2026-05-11T21:18:59.720

Modified: 2026-05-13T15:46:19.993

Link: CVE-2026-37630

cve-icon Redhat

No data.