CVE-2026-44293
protobufjs: Code injection through bytes field defaults in generated toObject code
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs generated JavaScript for toObject conversion could include an unsafe expression derived from a schema-controlled bytes field default value. A crafted descriptor with a non-string default value for a bytes field could cause attacker-controlled code to be emitted into the generated conversion function. This vulnerability is fixed in 7.5.6 and 8.0.2.
| CWE | CWE-94 |
| Vendor | protobufjs |
| Product | protobuf.js |
| Published | May 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for protobufjs protobuf.js
Be the first to know when new unknown vulnerabilities affecting protobufjs protobuf.js are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
protobufjs / protobuf.js
< 7.5.6 >= 8.0.0, < 8.0.2