Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-p6x5-p4xf-cc4r | Remote Code Execution (RCE) via String Literal Injection into math-codegen |
Tue, 12 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:mauriciopoppe:math-codegen:*:*:*:*:*:*:*:* |
Sun, 10 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mauriciopoppe
Mauriciopoppe math-codegen |
|
| Vendors & Products |
Mauriciopoppe
Mauriciopoppe math-codegen |
Fri, 08 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | math-codegen generates code from mathematical expressions. Prior to version 0.4.3, string literal content passed to cg.parse() is injected verbatim into a new Function() body without sanitization. This allows an attacker to execute arbitrary system commands when user-controlled input reaches the parser. Any application exposing a math evaluation endpoint where user input flows into cg.parse() is vulnerable to full RCE. This issue has been patched in version 0.4.3. | |
| Title | Remote Code Execution (RCE) via String Literal Injection into math-codegen | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T14:20:21.285Z
Reserved: 2026-04-20T18:18:50.681Z
Link: CVE-2026-41507
Updated: 2026-05-08T14:20:17.825Z
Status : Analyzed
Published: 2026-05-08T14:16:34.133
Modified: 2026-05-12T14:26:48.890
Link: CVE-2026-41507
No data.
OpenCVE Enrichment
Updated: 2026-05-10T21:25:19Z
Github GHSA