Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1144: Use After Free in quickjs-ng quickjs

0
Medium
VulnerabilityCVE-2026-1144cvecve-2026-1144
Published: Mon Jan 19 2026 (01/19/2026, 07:32:10 UTC)
Source: CVE Database V5
Vendor/Project: quickjs-ng
Product: quickjs

Description

A vulnerability was detected in quickjs-ng quickjs up to 0.11.0. Affected is an unknown function of the file quickjs.c of the component Atomics Ops Handler. The manipulation results in use after free. The attack can be executed remotely. The exploit is now public and may be used. The patch is identified as ea3e9d77454e8fc9cb3ef3c504e9c16af5a80141. Applying a patch is advised to resolve this issue.

AI-Powered Analysis

AILast updated: 01/19/2026, 07:56:18 UTC

Technical Analysis

CVE-2026-1144 identifies a use-after-free vulnerability in the quickjs-ng quickjs JavaScript engine, affecting all versions up to 0.11.0. The flaw resides in an unknown function within the quickjs.c file, specifically in the Atomics Ops Handler component, which manages atomic operations in JavaScript execution. Use-after-free vulnerabilities occur when a program continues to use memory after it has been freed, leading to undefined behavior such as memory corruption, crashes, or code execution. This vulnerability can be triggered remotely without requiring authentication, though it does require user interaction, such as processing malicious JavaScript code. The vulnerability's CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The exploit is publicly available, increasing the risk of exploitation, although no known active exploitation campaigns have been reported. The vulnerability affects a wide range of quickjs-ng versions from 0.1 through 0.11.0, which are commonly embedded in lightweight JavaScript environments, IoT devices, and some web applications. The patch identified by commit ea3e9d77454e8fc9cb3ef3c504e9c16af5a80141 addresses the issue by correcting memory management in the Atomics Ops Handler. Organizations relying on quickjs-ng quickjs should prioritize updating to patched versions to prevent potential exploitation that could lead to memory corruption and possible arbitrary code execution.

Potential Impact

For European organizations, the impact of CVE-2026-1144 can be significant, especially for those deploying quickjs-ng quickjs in embedded systems, IoT devices, or web applications that process untrusted JavaScript code. Exploitation could lead to memory corruption, causing application crashes or potentially enabling remote code execution, which threatens confidentiality, integrity, and availability of affected systems. This risk is heightened in sectors with critical infrastructure or sensitive data, such as finance, manufacturing, and telecommunications. The medium severity rating reflects moderate impact and exploitability, but the public availability of an exploit increases urgency. Disruptions could lead to downtime, data breaches, or unauthorized control over devices. Given the increasing adoption of IoT and lightweight JavaScript engines in Europe, unpatched systems could become entry points for attackers, potentially facilitating lateral movement or persistent access within networks.

Mitigation Recommendations

1. Immediately apply the official patch identified by commit ea3e9d77454e8fc9cb3ef3c504e9c16af5a80141 to all affected quickjs-ng quickjs versions. 2. Conduct an inventory of all systems and applications using quickjs-ng quickjs to ensure no vulnerable versions remain in production or development environments. 3. Restrict network exposure of services or devices running quickjs-ng quickjs, especially those processing untrusted input, to limit remote attack vectors. 4. Implement strict input validation and sandboxing for JavaScript execution environments to reduce the risk of malicious code triggering the vulnerability. 5. Monitor logs and network traffic for unusual activity related to quickjs usage or memory corruption indicators. 6. Educate developers and system administrators about the vulnerability and the importance of timely patching. 7. Consider deploying runtime application self-protection (RASP) or memory protection mechanisms to detect and prevent exploitation attempts. 8. For IoT devices, coordinate with vendors to ensure firmware updates include the patch and verify update mechanisms are secure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-18T13:43:14.894Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696de039d302b072d97ad5b0

Added to database: 1/19/2026, 7:41:45 AM

Last enriched: 1/19/2026, 7:56:18 AM

Last updated: 1/19/2026, 8:43:55 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats