Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8j44-735h-w4w2 | node-tesseract-ocr is vulnerable to OS Command Injection through unsanitized recognize() function parameter |
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zapolnoch
Zapolnoch node-tesseract-ocr |
|
| Vendors & Products |
Zapolnoch
Zapolnoch node-tesseract-ocr |
Wed, 25 Mar 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | node‑tesseract‑ocr OS Command Injection via Unsanitized File Path |
Wed, 25 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 | |
| Metrics |
ssvc
|
Wed, 25 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | node-tesseract-ocr is an npm package that provides a Node.js wrapper for Tesseract OCR. In all versions through 2.2.1, the recognize() function in src/index.js is vulnerable to OS Command Injection. The file path parameter is concatenated into a shell command string and passed to child_process.exec() without proper sanitization | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-25T17:52:56.510Z
Reserved: 2026-02-16T00:00:00.000Z
Link: CVE-2026-26832
Updated: 2026-03-25T17:52:52.211Z
Status : Awaiting Analysis
Published: 2026-03-25T16:16:21.240
Modified: 2026-03-26T15:13:15.790
Link: CVE-2026-26832
No data.
OpenCVE Enrichment
Updated: 2026-03-26T11:51:33Z
Github GHSA