Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26974: CWE-829: Inclusion of Functionality from Untrusted Control Sphere in Tygo-van-den-Hurk Slyde

0
High
VulnerabilityCVE-2026-26974cvecve-2026-26974cwe-829
Published: Fri Feb 20 2026 (02/20/2026, 00:34:37 UTC)
Source: CVE Database V5
Vendor/Project: Tygo-van-den-Hurk
Product: Slyde

Description

CVE-2026-26974 is a high-severity vulnerability affecting Slyde versions prior to 0. 0. 5, a Node. js-based program for creating animated presentations from XML. The vulnerability arises because Slyde automatically imports all files matching **/*. plugin. {js,mjs}, including those in node_modules, without restricting the source. This behavior allows malicious packages containing . plugin. js files to execute arbitrary code upon installation or require, posing a significant risk especially when untrusted packages are installed.

AI-Powered Analysis

AILast updated: 02/20/2026, 01:16:37 UTC

Technical Analysis

Slyde is a Node.js application designed to generate animated presentations from XML input. In versions 0.0.4 and earlier, it employs a dynamic import mechanism that automatically loads all files matching the pattern **/*.plugin.{js,mjs}, including those located within the node_modules directory. This import behavior does not discriminate between trusted and untrusted packages, which introduces a critical security flaw categorized under CWE-829: Inclusion of Functionality from Untrusted Control Sphere. An attacker can exploit this by publishing a malicious npm package containing a .plugin.js file. When such a package is installed or required by a project using vulnerable Slyde versions, the malicious code executes with the privileges of the Node.js process. This can lead to arbitrary code execution, compromising confidentiality, integrity, and availability of the host system. The vulnerability requires no authentication but does require user interaction in the form of installing or requiring the malicious package. The CVSS 4.0 base score is 7.6 (high), reflecting network attack vector, high impact on confidentiality and integrity, and user interaction required. The vulnerability was publicly disclosed on February 20, 2026, and fixed in Slyde version 0.0.5. No known exploits have been reported in the wild to date. Mitigation involves upgrading to the patched version or carefully auditing and restricting packages installed in node_modules to prevent untrusted code execution.

Potential Impact

This vulnerability enables remote attackers to execute arbitrary code on systems running vulnerable versions of Slyde by leveraging malicious npm packages containing .plugin.js files. The impact is severe as it can lead to full system compromise, data theft, or disruption of services. Organizations using Slyde in their development or production environments risk exposure to supply chain attacks, especially if they incorporate third-party or untrusted packages. The automatic import behavior increases the attack surface by implicitly trusting all installed packages. This can undermine the integrity of software builds and deployment pipelines, potentially affecting downstream users and clients. The vulnerability also threatens the confidentiality of sensitive data processed by Slyde and can cause denial of service if exploited to execute destructive payloads. Given the widespread use of Node.js and npm packages globally, the scope of affected systems is significant, particularly in development environments that do not enforce strict package vetting.

Mitigation Recommendations

1. Upgrade all instances of Slyde to version 0.0.5 or later, where the automatic import behavior has been corrected. 2. Implement strict package management policies: audit all installed npm packages for legitimacy and remove any untrusted or unnecessary dependencies. 3. Use npm package integrity verification tools such as npm audit, npm ci with package-lock.json, or third-party supply chain security tools to detect malicious packages. 4. Restrict the import paths or modify the loading mechanism in custom forks of Slyde to exclude node_modules or untrusted directories from automatic imports. 5. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to monitor and block suspicious code execution originating from node_modules. 6. Educate developers and DevOps teams about the risks of installing untrusted packages and encourage the use of private registries or vetted package repositories. 7. Consider containerizing Slyde environments with minimal privileges and immutable filesystems to limit the impact of potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-16T22:20:28.612Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6997b28bd7880ec89b4763ab

Added to database: 2/20/2026, 1:02:03 AM

Last enriched: 2/20/2026, 1:16:37 AM

Last updated: 2/20/2026, 2:31:30 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats