An issue in QuickJS-NG v.0.12.1 allows an attacker to execute arbitrary code via the js_mapped_arguments_mark function

Project Subscriptions

Vendors Products
Quickjs-ng Subscribe
Quickjs Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 12 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 22:45:00 +0000

Type Values Removed Values Added
Title Arbitrary Code Execution via js_mapped_arguments_mark in QuickJS‑NG
First Time appeared Quickjs-ng
Quickjs-ng quickjs
Weaknesses CWE-94
Vendors & Products Quickjs-ng
Quickjs-ng quickjs

Mon, 11 May 2026 20:45:00 +0000

Type Values Removed Values Added
Description An issue in QuickJS-NG v.0.12.1 allows an attacker to execute arbitrary code via the js_mapped_arguments_mark function
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-12T13:32:58.393Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-37630

cve-icon Vulnrichment

Updated: 2026-05-12T13:31:18.416Z

cve-icon NVD

Status : Received

Published: 2026-05-11T21:18:59.720

Modified: 2026-05-12T14:17:02.533

Link: CVE-2026-37630

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T22:30:08Z

Weaknesses