• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution

You are here: Home / General Cyber Security News / CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution
January 21, 2026

A security vulnerability has been disclosed in the popular binary-parser npm library that, if successfully exploited, could result in the execution of arbitrary JavaScript.

The vulnerability, tracked as CVE-2026-1245 (CVSS score: N/A), affects all versions of the module prior to version 2.3.0, which addresses the issue. Patches for the flaw were released on November 26, 2025.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Binary-parser is a widely used parser builder for JavaScript that allows developers to parse binary data. It supports a wide range of common data types, including integers, floating-point values, strings, and arrays. The package attracts approximately 13,000 downloads on a weekly basis.

According to an advisory released by the CERT Coordination Center (CERT/CC), the vulnerability has to do with a lack of sanitization of user-supplied values, such as parser field names and encoding parameters, when the JavaScript parser code is dynamically generated at runtime using the “Function” constructor.

Cybersecurity

It’s worth noting that the npm library builds JavaScript source code as a string that represents the parsing logic and compiles it using the Function constructor and caches it as an executable function to parse buffers efficiently.

However, as a result of CVE-2026-1245, an attacker-controlled input could make its way to the generated code without adequate validation, causing the application to parse untrusted data, resulting in the execution of arbitrary code. Applications that use only static, hard-coded parser definitions are not affected by the flaw.

“In affected applications that construct parser definitions using untrusted input, an attacker may be able to execute arbitrary JavaScript code with the privileges of the Node.js process,” CERT/CC said. “This could allow access to local data, manipulation of application logic, or execution of system commands depending on the deployment environment.”

Security researcher Maor Caplan has been credited with discovering and reporting the vulnerability. Users of binary-parser are advised to upgrade to version 2.3.0 and avoid passing user-controlled values into parser field names or encoding parameters.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «north korea linked hackers target developers via malicious vs code projects North Korea-Linked Hackers Target Developers via Malicious VS Code Projects

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution
  • North Korea-Linked Hackers Target Developers via Malicious VS Code Projects
  • Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution
  • Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading
  • The Hidden Risk of Orphan Accounts
  • Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto
  • Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers
  • Why Secrets in JavaScript Bundles are Still Being Missed
  • Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over $12 Billion
  • Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites

Copyright © TheCyberSecurity.News, All Rights Reserved.