Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-fp25-p6mj-qqg6 | locutus call_user_func_array vulnerable to Remote Code Execution (RCE) due to Code Injection |
Wed, 25 Mar 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 13 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:locutus:locutus:*:*:*:*:*:node.js:*:* |
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Locutus
Locutus locutus |
|
| Vendors & Products |
Locutus
Locutus locutus |
Fri, 06 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to version 3.0.0, a remote code execution (RCE) flaw was discovered in the locutus project, specifically within the call_user_func_array function implementation. The vulnerability allows an attacker to inject arbitrary JavaScript code into the application's runtime environment. This issue stems from an insecure implementation of the call_user_func_array function (and its wrapper call_user_func), which fails to properly validate all components of a callback array before passing them to eval(). This issue has been patched in version 3.0.0. | |
| Title | Locutus: Remote Code Execution (RCE) in locutus call_user_func_array due to Code Injection | |
| Weaknesses | CWE-95 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-06T18:34:27.477Z
Reserved: 2026-03-03T21:54:06.707Z
Link: CVE-2026-29091
Updated: 2026-03-06T18:34:17.673Z
Status : Analyzed
Published: 2026-03-06T18:16:20.257
Modified: 2026-03-13T19:07:16.483
Link: CVE-2026-29091
OpenCVE Enrichment
Updated: 2026-04-16T11:30:15Z
Github GHSA