Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1145: Heap-based Buffer Overflow in quickjs-ng quickjs

0
Medium
VulnerabilityCVE-2026-1145cvecve-2026-1145
Published: Mon Jan 19 2026 (01/19/2026, 08:02:08 UTC)
Source: CVE Database V5
Vendor/Project: quickjs-ng
Product: quickjs

Description

CVE-2026-1145 is a medium severity heap-based buffer overflow vulnerability in the quickjs-ng quickjs JavaScript engine versions up to 0. 11. 0. The flaw exists in the js_typed_array_constructor_ta function within quickjs. c and can be exploited remotely without authentication. Successful exploitation requires user interaction and may lead to limited confidentiality, integrity, and availability impacts. Although no known exploits are currently active in the wild, a proof-of-concept exploit has been published. A patch identified by commit 53aebe66170d545bb6265906fe4324e4477de8b4 is available and should be applied promptly. European organizations using quickjs-ng quickjs, especially in embedded systems or web environments, should prioritize mitigation. Countries with strong software development sectors and critical infrastructure relying on quickjs are at higher risk.

AI-Powered Analysis

AILast updated: 01/26/2026, 20:07:45 UTC

Technical Analysis

CVE-2026-1145 is a heap-based buffer overflow vulnerability found in the quickjs-ng quickjs JavaScript engine, affecting all versions up to 0.11.0. The vulnerability resides in the function js_typed_array_constructor_ta within the quickjs.c source file. This function improperly handles typed array construction, leading to a heap overflow condition when processing crafted inputs. The flaw can be triggered remotely without requiring authentication, though user interaction is necessary to initiate the exploit. The vulnerability allows an attacker to corrupt heap memory, potentially enabling arbitrary code execution, denial of service, or information disclosure, albeit with limited impact on confidentiality, integrity, and availability as indicated by the CVSS vector. The exploit complexity is low, and no privileges are needed, increasing the risk profile. Although no active exploits have been observed in the wild, a proof-of-concept exploit has been published, increasing the urgency for patching. The vendor has released a patch (commit 53aebe66170d545bb6265906fe4324e4477de8b4) that corrects the buffer handling in the affected function. Quickjs-ng quickjs is used in various embedded and web applications for JavaScript execution, making this vulnerability relevant to environments where this engine is embedded or exposed to untrusted inputs.

Potential Impact

For European organizations, the impact of CVE-2026-1145 depends on the extent of quickjs-ng quickjs usage within their software stacks, particularly in embedded devices, IoT, or web platforms. Successful exploitation could lead to arbitrary code execution or denial of service, potentially disrupting services or enabling further compromise. Confidentiality and integrity impacts are limited but non-negligible, especially if the vulnerability is chained with other exploits. Critical infrastructure sectors such as telecommunications, manufacturing, and energy that utilize embedded JavaScript engines may face operational risks. Additionally, organizations providing software development or hosting services that incorporate quickjs-ng quickjs could see reputational damage and customer impact if exploited. The remote and unauthenticated nature of the vulnerability increases the attack surface, especially for externally facing services or devices. However, the requirement for user interaction somewhat limits automated mass exploitation. Overall, the vulnerability poses a moderate risk that should be addressed promptly to prevent potential exploitation in European environments.

Mitigation Recommendations

1. Immediately apply the official patch identified by commit 53aebe66170d545bb6265906fe4324e4477de8b4 to all affected quickjs-ng quickjs versions up to 0.11.0. 2. Conduct an inventory of all systems and applications using quickjs-ng quickjs to identify vulnerable instances, including embedded devices and development environments. 3. Restrict network exposure of services or devices running vulnerable quickjs versions, especially those accessible from untrusted networks. 4. Implement input validation and sanitization on any interfaces that process JavaScript code or typed arrays to reduce the risk of malicious input triggering the vulnerability. 5. Monitor logs and network traffic for unusual activity or signs of exploitation attempts targeting quickjs. 6. Educate developers and system administrators about the vulnerability and the importance of timely patching. 7. For environments where patching is not immediately feasible, consider deploying runtime protections such as heap memory integrity checks or sandboxing to mitigate exploitation impact. 8. Stay updated with vendor advisories and threat intelligence feeds for any emerging exploit activity or additional mitigations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-18T13:43:22.716Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696deac5d302b072d98c4bf0

Added to database: 1/19/2026, 8:26:45 AM

Last enriched: 1/26/2026, 8:07:45 PM

Last updated: 2/7/2026, 6:42:35 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats