CVE-2026-3979
quickjs-ng quickjs quickjs.c js_iterator_concat_return use after free
CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th
A flaw has been found in quickjs-ng quickjs up to 0.12.1. This affects the function js_iterator_concat_return of the file quickjs.c. This manipulation causes use after free. The attack requires local access. The exploit has been published and may be used. Patch name: daab4ad4bae4ef071ed0294618d6244e92def4cd. Applying a patch is the recommended action to fix this issue.
| CWE | CWE-416 CWE-119 |
| Vendor | quickjs-ng |
| Product | quickjs |
| Published | Mar 12, 2026 |
| Last Updated | Mar 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for quickjs-ng quickjs
Be the first to know when new medium vulnerabilities affecting quickjs-ng quickjs are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
quickjs-ng / quickjs
0.12.0 0.12.1
References
vuldb.com: https://vuldb.com/?id.350414 vuldb.com: https://vuldb.com/?ctiid.350414 vuldb.com: https://vuldb.com/?submit.769600 github.com: https://github.com/quickjs-ng/quickjs/issues/1368 github.com: https://github.com/quickjs-ng/quickjs/pull/1370 github.com: https://github.com/quickjs-ng/quickjs/issues/1368#issue-4004680962 github.com: https://github.com/quickjs-ng/quickjs/commit/daab4ad4bae4ef071ed0294618d6244e92def4cd github.com: https://github.com/quickjs-ng/quickjs/
Credits
๐ im-razvan (VulDB User)