CVE-2026-0821

7.3 HIGH
Published: January 10, 2026 Modified: February 23, 2026
View on NVD

Description

A vulnerability was determined in quickjs-ng quickjs up to 0.11.0. This vulnerability affects the function js_typed_array_constructor of the file quickjs.c. Executing a manipulation can lead to heap-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. This patch is called c5d80831e51e48a83eab16ea867be87f091783c5. A patch should be applied to remediate this issue.

AI Explanation

**Plain-language summary** CVE‑2026‑0821 is a heap‑based buffer overflow in the `js_typed_array_constructor` function of the quickjs‑ng quickjs JavaScript engine (file `quickjs.c`). The flaw can be triggered remotely without user interaction, and a public exploit exists. **Who is affected** All versions of quickjs‑ng quickjs up to and including **0.11.0** are vulnerable. The vulnerability is present in the upstream quickjs‑ng project; downstream distributions (e.g., Debian’s `quickjs` package) may also be affected until they integrate the fix. **What an attacker could do** By sending crafted input that triggers the overflow, an attacker could execute arbitrary code on the target system, cause a denial‑of‑service crash, or corrupt memory—potentially leading to full system compromise if the engine runs with elevated privileges. **Recommended remediation** 1. **Apply the official patch** (commit `c5d80831e51e48a83eab16ea867be87f091783c5`) from the quickjs‑ng repository. 2. **Update to a fixed version** once released by the project or your distribution. 3. **Recompile** any software that embeds the vulnerable quickjs library. 4. If immediate patching isn’t possible, consider **isolating or disabling** services that expose the quickjs engine to untrusted input.

Generated: 2026-01-17 23:02

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/quickjs-ng/quickjs/issues/1296
Source: cna@vuldb.com
Exploit Issue Tracking Vendor Advisory
https://github.com/quickjs-ng/quickjs/issues/1296#issue-3780003395
Source: cna@vuldb.com
Exploit Issue Tracking Vendor Advisory
https://github.com/quickjs-ng/quickjs/pull/1299
Source: cna@vuldb.com
Issue Tracking
https://vuldb.com/?ctiid.340355
Source: cna@vuldb.com
Permissions Required VDB Entry
https://vuldb.com/?id.340355
Source: cna@vuldb.com
Third Party Advisory VDB Entry
https://vuldb.com/?submit.731780
Source: cna@vuldb.com
Third Party Advisory VDB Entry

8 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.3 / 10.0
EPSS (Exploit Probability)
0.1%
33th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

quickjs-ng