CVE-2026-1145: Heap-based Buffer Overflow in quickjs-ng quickjs
CVE-2026-1145 is a medium severity heap-based buffer overflow vulnerability in the quickjs-ng quickjs JavaScript engine versions up to 0. 11. 0, specifically in the js_typed_array_constructor_ta function. This flaw allows remote attackers to trigger a heap overflow without requiring privileges or authentication, though user interaction is needed. Exploitation could lead to partial compromise of confidentiality, integrity, and availability of affected systems. A patch has been released and applying it is strongly recommended. The vulnerability has a CVSS 4. 0 base score of 5. 3, reflecting moderate risk. European organizations using quickjs in embedded systems or applications should prioritize patching to mitigate potential exploitation.
AI Analysis
Technical Summary
CVE-2026-1145 is a heap-based buffer overflow vulnerability identified in the quickjs-ng quickjs JavaScript engine, affecting all versions up to and including 0.11.0. The vulnerability resides in the function js_typed_array_constructor_ta within the quickjs.c source file. This function is responsible for constructing typed arrays, and improper handling of input data leads to a heap overflow condition. The flaw can be exploited remotely without requiring any privileges or authentication, though user interaction is necessary to trigger the vulnerability. The overflow can corrupt memory on the heap, potentially allowing an attacker to execute arbitrary code, cause a denial of service, or leak sensitive information. The vulnerability has been assigned a CVSS 4.0 score of 5.3, indicating medium severity, with attack vector network (remote), low complexity, no privileges required, but user interaction needed. The impact on confidentiality, integrity, and availability is low to moderate. A patch identified by commit 53aebe66170d545bb6265906fe4324e4477de8b4 has been released to address this issue. Although no known exploits are currently in the wild, the existence of a public exploit increases the risk of exploitation. Quickjs is often embedded in IoT devices, software applications, and development tools, making this vulnerability relevant to a broad range of systems.
Potential Impact
For European organizations, the impact of CVE-2026-1145 depends on the extent of quickjs usage within their software stacks, particularly in embedded systems, IoT devices, or applications that incorporate the quickjs engine. Successful exploitation could lead to remote code execution, enabling attackers to compromise system confidentiality, integrity, and availability. This could result in data breaches, system downtime, or unauthorized control over critical infrastructure components. Sectors such as manufacturing, telecommunications, and critical infrastructure that rely on embedded JavaScript engines may face increased risk. The medium severity rating suggests that while the vulnerability is serious, it is not trivially exploitable without user interaction, somewhat limiting widespread impact. However, the presence of a public exploit increases the urgency for remediation to prevent targeted attacks. Organizations failing to patch may face regulatory and reputational risks, especially under GDPR and other European cybersecurity regulations.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately identify all systems and applications using quickjs versions up to 0.11.0, including embedded devices and development environments. 2) Apply the official patch (commit 53aebe66170d545bb6265906fe4324e4477de8b4) to update quickjs to a secure version. 3) Where patching is not immediately feasible, employ network-level protections such as strict firewall rules and intrusion detection systems to monitor and block suspicious traffic targeting quickjs services. 4) Implement application-level input validation and sanitization to reduce the risk of malformed input triggering the vulnerability. 5) Conduct security awareness training to minimize risky user interactions that could enable exploitation. 6) Monitor threat intelligence feeds for emerging exploit techniques related to this CVE. 7) For IoT and embedded device manufacturers, integrate secure coding practices and regular vulnerability scanning into the development lifecycle to prevent similar issues. 8) Consider deploying runtime application self-protection (RASP) or sandboxing techniques to contain potential exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden, Finland
CVE-2026-1145: Heap-based Buffer Overflow in quickjs-ng quickjs
Description
CVE-2026-1145 is a medium severity heap-based buffer overflow vulnerability in the quickjs-ng quickjs JavaScript engine versions up to 0. 11. 0, specifically in the js_typed_array_constructor_ta function. This flaw allows remote attackers to trigger a heap overflow without requiring privileges or authentication, though user interaction is needed. Exploitation could lead to partial compromise of confidentiality, integrity, and availability of affected systems. A patch has been released and applying it is strongly recommended. The vulnerability has a CVSS 4. 0 base score of 5. 3, reflecting moderate risk. European organizations using quickjs in embedded systems or applications should prioritize patching to mitigate potential exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2026-1145 is a heap-based buffer overflow vulnerability identified in the quickjs-ng quickjs JavaScript engine, affecting all versions up to and including 0.11.0. The vulnerability resides in the function js_typed_array_constructor_ta within the quickjs.c source file. This function is responsible for constructing typed arrays, and improper handling of input data leads to a heap overflow condition. The flaw can be exploited remotely without requiring any privileges or authentication, though user interaction is necessary to trigger the vulnerability. The overflow can corrupt memory on the heap, potentially allowing an attacker to execute arbitrary code, cause a denial of service, or leak sensitive information. The vulnerability has been assigned a CVSS 4.0 score of 5.3, indicating medium severity, with attack vector network (remote), low complexity, no privileges required, but user interaction needed. The impact on confidentiality, integrity, and availability is low to moderate. A patch identified by commit 53aebe66170d545bb6265906fe4324e4477de8b4 has been released to address this issue. Although no known exploits are currently in the wild, the existence of a public exploit increases the risk of exploitation. Quickjs is often embedded in IoT devices, software applications, and development tools, making this vulnerability relevant to a broad range of systems.
Potential Impact
For European organizations, the impact of CVE-2026-1145 depends on the extent of quickjs usage within their software stacks, particularly in embedded systems, IoT devices, or applications that incorporate the quickjs engine. Successful exploitation could lead to remote code execution, enabling attackers to compromise system confidentiality, integrity, and availability. This could result in data breaches, system downtime, or unauthorized control over critical infrastructure components. Sectors such as manufacturing, telecommunications, and critical infrastructure that rely on embedded JavaScript engines may face increased risk. The medium severity rating suggests that while the vulnerability is serious, it is not trivially exploitable without user interaction, somewhat limiting widespread impact. However, the presence of a public exploit increases the urgency for remediation to prevent targeted attacks. Organizations failing to patch may face regulatory and reputational risks, especially under GDPR and other European cybersecurity regulations.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately identify all systems and applications using quickjs versions up to 0.11.0, including embedded devices and development environments. 2) Apply the official patch (commit 53aebe66170d545bb6265906fe4324e4477de8b4) to update quickjs to a secure version. 3) Where patching is not immediately feasible, employ network-level protections such as strict firewall rules and intrusion detection systems to monitor and block suspicious traffic targeting quickjs services. 4) Implement application-level input validation and sanitization to reduce the risk of malformed input triggering the vulnerability. 5) Conduct security awareness training to minimize risky user interactions that could enable exploitation. 6) Monitor threat intelligence feeds for emerging exploit techniques related to this CVE. 7) For IoT and embedded device manufacturers, integrate secure coding practices and regular vulnerability scanning into the development lifecycle to prevent similar issues. 8) Consider deploying runtime application self-protection (RASP) or sandboxing techniques to contain potential exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-18T13:43:22.716Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696deac5d302b072d98c4bf0
Added to database: 1/19/2026, 8:26:45 AM
Last enriched: 1/19/2026, 8:41:16 AM
Last updated: 1/19/2026, 10:53:10 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1149: Command Injection in Totolink LR350
MediumCVE-2026-1148: Cross-Site Request Forgery in SourceCodester Patients Waiting Area Queue Management System
MediumCVE-2026-1147: Cross Site Scripting in SourceCodester Patients Waiting Area Queue Management System
Medium19th January – Threat Intelligence Report
MediumCVE-2026-1146: Cross Site Scripting in SourceCodester Patients Waiting Area Queue Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.