Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs

0
Medium
VulnerabilityCVE-2026-0822cvecve-2026-0822
Published: Sat Jan 10 2026 (01/10/2026, 13:32:08 UTC)
Source: CVE Database V5
Vendor/Project: quickjs-ng
Product: quickjs

Description

A vulnerability was identified in quickjs-ng quickjs up to 0.11.0. This issue affects the function js_typed_array_sort of the file quickjs.c. The manipulation leads to heap-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 53eefbcd695165a3bd8c584813b472cb4a69fbf5. To fix this issue, it is recommended to deploy a patch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:44:14 UTC

Technical Analysis

The vulnerability CVE-2026-0822 affects the quickjs-ng quickjs JavaScript engine, specifically versions from 0.1 through 0.11.0. The issue resides in the js_typed_array_sort function within the quickjs.c source file, where improper handling of typed array sorting operations leads to a heap-based buffer overflow. This memory corruption flaw can be triggered remotely over the network without requiring authentication, although user interaction is necessary to exploit it. The overflow may allow attackers to overwrite heap memory, potentially enabling arbitrary code execution, application crashes, or denial of service conditions. The vulnerability is classified with a CVSS 4.0 score of 5.3, reflecting medium severity due to the combination of remote exploitability, lack of required privileges, but the need for user interaction and limited impact on confidentiality, integrity, and availability. A patch addressing this vulnerability has been committed (commit ID 53eefbcd695165a3bd8c584813b472cb4a69fbf5), which corrects the memory handling in the affected function. While no active exploits have been reported in the wild, publicly available exploit code increases the likelihood of future attacks. Quickjs-ng quickjs is often embedded in various applications and devices for JavaScript execution, making this vulnerability relevant for a broad range of software relying on this engine.

Potential Impact

The heap-based buffer overflow in quickjs-ng quickjs can have significant impacts on organizations that embed this JavaScript engine in their products or services. Successful exploitation could lead to arbitrary code execution, allowing attackers to take control of affected systems, escalate privileges, or execute malicious payloads. This could result in data breaches, service disruptions, or compromise of critical infrastructure. The vulnerability's remote exploitability without authentication increases the attack surface, especially for internet-facing applications or devices using quickjs. The requirement for user interaction somewhat limits mass exploitation but does not eliminate risk, particularly in environments where users may be tricked into triggering the vulnerability. Given quickjs's use in embedded systems, IoT devices, and lightweight JavaScript execution contexts, the impact could extend to industrial control systems, consumer electronics, and web services. Organizations failing to patch may face increased risk of targeted attacks or automated exploitation attempts once public exploit code is leveraged by threat actors.

Mitigation Recommendations

To mitigate CVE-2026-0822, organizations should promptly apply the official patch identified by commit 53eefbcd695165a3bd8c584813b472cb4a69fbf5 to all affected versions of quickjs-ng quickjs (0.1 through 0.11.0). Where patching is not immediately feasible, consider implementing network-level protections such as firewall rules to restrict access to services utilizing quickjs, especially from untrusted networks. Employ application-layer input validation and sanitization to reduce the risk of malicious input triggering the vulnerable function. Monitor logs and network traffic for unusual activity indicative of exploitation attempts. Additionally, conduct code audits and penetration testing focusing on JavaScript engine integrations to identify potential exploitation vectors. For embedded or IoT devices, coordinate with vendors for firmware updates and ensure secure update mechanisms are in place. Educate users about the risks of interacting with untrusted content that could trigger the vulnerability. Finally, maintain an incident response plan to quickly address any exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-09T18:24:23.935Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69625828f2400df44e4e54f0

Added to database: 1/10/2026, 1:46:16 PM

Last enriched: 2/23/2026, 10:44:14 PM

Last updated: 3/25/2026, 10:03:57 AM

Views: 160

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses