CVE-2026-24132

Orval generates type-safe JS clients (TypeScript) from any valid OpenAPI v3 or Swagger v2 specification. Versions 7.19.0 and below and 8.0.0-rc.0 through 8.0.2 allow untrusted OpenAPI specifications to inject arbitrary TypeScript/JavaScript into generated mock files via the const keyword on schema properties. These const values are interpolated into the mock scalar generator (getMockScalar in packages/mock/src/faker/getters/scalar.ts) without proper escaping or type-safe serialization, which results in attacker-controlled code being emitted into both interface definitions and faker/MSW handlers. The vulnerability is similar in impact to the previously reported enum x-enumDescriptions (GHSA-h526-wf6g-67jv), but it affects a different code path in the faker-based mock generator rather than @orval/core. The issue has been fixed in versions 7.20.0 and 8.0.3.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:orval:orval:*:*:*:*:*:*:*:*
cpe:2.3:a:orval:orval:*:*:*:*:*:*:*:*

History

27 Feb 2026, 19:00

Type Values Removed Values Added
References () https://github.com/orval-labs/orval/commit/44ca8c1f5f930a3e4cefb6b79b38bcde7f8532a5 - () https://github.com/orval-labs/orval/commit/44ca8c1f5f930a3e4cefb6b79b38bcde7f8532a5 - Patch
References () https://github.com/orval-labs/orval/commit/6d8ece07ccb80693ad43edabccb3957aceadcd06 - () https://github.com/orval-labs/orval/commit/6d8ece07ccb80693ad43edabccb3957aceadcd06 - Patch
References () https://github.com/orval-labs/orval/commit/9b211cddc9f009f8a671e4ac5c6cb72cd8646b62 - () https://github.com/orval-labs/orval/commit/9b211cddc9f009f8a671e4ac5c6cb72cd8646b62 - Patch
References () https://github.com/orval-labs/orval/pull/2828 - () https://github.com/orval-labs/orval/pull/2828 - Issue Tracking, Patch
References () https://github.com/orval-labs/orval/pull/2829 - () https://github.com/orval-labs/orval/pull/2829 - Issue Tracking, Patch
References () https://github.com/orval-labs/orval/pull/2830 - () https://github.com/orval-labs/orval/pull/2830 - Issue Tracking, Patch
References () https://github.com/orval-labs/orval/releases/tag/v7.20.0 - () https://github.com/orval-labs/orval/releases/tag/v7.20.0 - Product, Release Notes
References () https://github.com/orval-labs/orval/releases/tag/v8.0.3 - () https://github.com/orval-labs/orval/releases/tag/v8.0.3 - Product, Release Notes
References () https://github.com/orval-labs/orval/security/advisories/GHSA-f456-rf33-4626 - () https://github.com/orval-labs/orval/security/advisories/GHSA-f456-rf33-4626 - Vendor Advisory
CPE cpe:2.3:a:orval:orval:*:*:*:*:*:*:*:*
CWE CWE-94
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Orval orval
Orval

23 Jan 2026, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-23 00:15

Updated : 2026-02-27 19:00


NVD link : CVE-2026-24132

Mitre link : CVE-2026-24132

CVE.ORG link : CVE-2026-24132


JSON object : View

Products Affected

orval

  • orval
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-94

Improper Control of Generation of Code ('Code Injection')