Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vh9h-29pq-r5m8 | Locutus vulnerable to RCE via unsanitized input in create_function() |
Thu, 19 Mar 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:locutus:locutus:*:*:*:*:*:node.js:*:* |
Tue, 17 Mar 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 13 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Locutus
Locutus locutus |
|
| Vendors & Products |
Locutus
Locutus locutus |
Thu, 12 Mar 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to 3.0.14, the create_function(args, code) function passes both parameters directly to the Function constructor without any sanitization, allowing arbitrary code execution. This is distinct from CVE-2026-29091 which was call_user_func_array using eval() in v2.x. This finding affects create_function using new Function() in v3.x. This vulnerability is fixed in 3.0.14. | |
| Title | Locutus: RCE via unsanitized input in create_function() | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-13T13:12:13.553Z
Reserved: 2026-03-11T21:16:21.659Z
Link: CVE-2026-32304
Updated: 2026-03-13T13:12:09.830Z
Status : Analyzed
Published: 2026-03-13T19:54:41.830
Modified: 2026-03-19T13:48:33.690
Link: CVE-2026-32304
OpenCVE Enrichment
Updated: 2026-03-23T10:00:18Z
Github GHSA