Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-41907: CWE-823: Use of Out-of-range Pointer Offset in uuidjs uuid

0
High
VulnerabilityCVE-2026-41907cvecve-2026-41907cwe-823cwe-787
Published: Fri Apr 24 2026 (04/24/2026, 18:09:24 UTC)
Source: CVE Database V5
Vendor/Project: uuidjs
Product: uuid

Description

uuid is for the creation of RFC9562 (formerly RFC4122) UUIDs. Prior to 14.0.0, v3, v5, and v6 accept external output buffers but do not reject out-of-range writes (small buf or large offset). This allows silent partial writes into caller-provided buffers. This vulnerability is fixed in 14.0.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/24/2026, 18:51:02 UTC

Technical Analysis

The uuidjs library, used for generating RFC9562-compliant UUIDs, had a vulnerability in versions before 14.0.0 where the v3, v5, and v6 functions accepted external output buffers but did not reject out-of-range writes caused by small buffers or large offsets. This improper validation allows silent partial writes into the caller's buffer, classified under CWE-823 (Use of Out-of-range Pointer Offset) and CWE-787 (Out-of-bounds Write). The vulnerability has a CVSS 4.0 score of 8.1, indicating high severity. The issue is resolved in version 14.0.0 of uuidjs.

Potential Impact

Exploitation of this vulnerability can cause silent partial writes to memory buffers provided by the caller, potentially leading to memory corruption or unexpected behavior in applications using vulnerable versions of uuidjs. No known exploits are reported in the wild at this time.

Mitigation Recommendations

Upgrade uuidjs to version 14.0.0 or later, where this vulnerability is fixed. Patch status is confirmed by the vendor advisory indicating the fix in version 14.0.0. No additional mitigations are specified.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-04-22T15:11:54.673Z
Cvss Version
4.0
State
PUBLISHED
Remediation Level
null

Threat ID: 69ebb81d87115cfb68646f76

Added to database: 4/24/2026, 6:36:13 PM

Last enriched: 4/24/2026, 6:51:02 PM

Last updated: 4/25/2026, 5:45:41 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses