Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0969: CWE-94: Improper Control of Generation of Code (Code Injection) in HashiCorp Shared library

0
High
VulnerabilityCVE-2026-0969cvecve-2026-0969cwe-94
Published: Thu Feb 12 2026 (02/12/2026, 01:35:06 UTC)
Source: CVE Database V5
Vendor/Project: HashiCorp
Product: Shared library

Description

CVE-2026-0969 is a high-severity code injection vulnerability in the HashiCorp shared library version 4. 3. 0, specifically in the serialize function used to compile MDX content in next-mdx-remote. The vulnerability arises from insufficient sanitization of MDX input, allowing attackers with low privileges to execute arbitrary code remotely without user interaction. This flaw impacts confidentiality, integrity, and availability, potentially enabling full system compromise. Although no known exploits are currently in the wild, the vulnerability's ease of exploitation and broad impact make it a critical concern. European organizations using this library in web applications or content management systems are at risk, especially in countries with high adoption of HashiCorp products and cloud infrastructure. Mitigation requires immediate patching once available, strict input validation, and restricting access to the vulnerable function. Countries like Germany, the UK, France, and the Netherlands are likely most affected due to their extensive use of cloud services and developer tools. Defenders should prioritize vulnerability scanning, monitor for suspicious activity, and apply compensating controls until patches are released.

AI-Powered Analysis

AILast updated: 02/12/2026, 02:46:07 UTC

Technical Analysis

CVE-2026-0969 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code), affecting the serialize function in the HashiCorp shared library version 4.3.0. This function is responsible for compiling MDX content in the next-mdx-remote package. The vulnerability stems from insufficient sanitization of MDX input, which allows an attacker to inject and execute arbitrary code remotely. The CVSS 3.1 score of 8.8 reflects a high-severity issue, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation does not require user interaction, making it easier to leverage in automated attacks. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to applications that process MDX content using this library. The flaw could be exploited to execute malicious code on servers, leading to data breaches, service disruption, or full system compromise. The vulnerability was reserved on January 14, 2026, and published on February 12, 2026, but no patches are currently linked, indicating that immediate mitigation strategies are critical. The vulnerability affects organizations that use HashiCorp shared libraries in their software stacks, particularly those integrating MDX content rendering in web applications.

Potential Impact

For European organizations, this vulnerability presents a substantial risk due to the widespread use of HashiCorp tools and libraries in cloud infrastructure and development environments. Exploitation could lead to unauthorized code execution, resulting in data theft, corruption, or service outages. Organizations relying on next-mdx-remote for content rendering are particularly vulnerable, potentially exposing web servers to remote compromise. The impact extends to confidentiality, integrity, and availability, threatening sensitive data and operational continuity. Given the low complexity and no user interaction required, attackers could automate exploitation at scale, targeting multiple organizations simultaneously. This could disrupt critical services, especially in sectors like finance, healthcare, and government, which are prevalent in Europe. Additionally, the vulnerability could be leveraged as a foothold for lateral movement within networks, escalating the severity of attacks. Without immediate remediation, European entities face increased exposure to cyber espionage, ransomware, and data breaches.

Mitigation Recommendations

Until an official patch is released, European organizations should implement strict input validation and sanitization for all MDX content processed by next-mdx-remote to prevent malicious code injection. Restrict access to the serialize function and related components to trusted users and systems only, employing network segmentation and least privilege principles. Monitor application logs and network traffic for unusual activity indicative of exploitation attempts, such as unexpected code execution or anomalous MDX content submissions. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious payloads targeting the vulnerable function. Conduct thorough code reviews and security testing on applications using the affected library to identify and remediate potential injection vectors. Prepare for rapid deployment of patches once available by maintaining an up-to-date inventory of affected systems. Educate developers and security teams about the risks of code injection vulnerabilities and safe handling of dynamic content. Finally, consider isolating or sandboxing components that process MDX content to limit the blast radius of potential exploits.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
HashiCorp
Date Reserved
2026-01-14T22:09:31.064Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698d3b734b57a58fa19a91e8

Added to database: 2/12/2026, 2:31:15 AM

Last enriched: 2/12/2026, 2:46:07 AM

Last updated: 2/12/2026, 4:01:24 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats