Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jvwf-75h9-cwgg | protobuf.js: Process-wide denial of service through unsafe option paths |
Thu, 14 May 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Protobuf
Protobuf protobuf |
|
| Vendors & Products |
Protobuf
Protobuf protobuf |
Thu, 14 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Protobufjs Project
Protobufjs Project protobufjs |
|
| CPEs | cpe:2.3:a:protobufjs_project:protobufjs:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Protobufjs Project
Protobufjs Project protobufjs |
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs allowed certain schema option paths to traverse through inherited object properties while applying options. A crafted protobuf schema or JSON descriptor could cause option handling to write to properties on global JavaScript constructors, corrupting process-wide built-in functionality. This vulnerability is fixed in 7.5.6 and 8.0.2. | |
| Title | protobufjs: Process-wide denial of service through unsafe option paths | |
| Weaknesses | CWE-1321 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T13:45:12.701Z
Reserved: 2026-05-05T17:39:31.112Z
Link: CVE-2026-44290
Updated: 2026-05-14T13:45:07.436Z
Status : Analyzed
Published: 2026-05-13T16:16:55.847
Modified: 2026-05-14T12:23:20.007
Link: CVE-2026-44290
No data.
OpenCVE Enrichment
Updated: 2026-05-14T14:30:15Z
Github GHSA