CVE-2026-32304

Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to 3.0.14, the create_function(args, code) function passes both parameters directly to the Function constructor without any sanitization, allowing arbitrary code execution. This is distinct from CVE-2026-29091 which was call_user_func_array using eval() in v2.x. This finding affects create_function using new Function() in v3.x. This vulnerability is fixed in 3.0.14.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:locutus:locutus:*:*:*:*:*:node.js:*:*

History

19 Mar 2026, 13:48

Type Values Removed Values Added
CPE cpe:2.3:a:locutus:locutus:*:*:*:*:*:node.js:*:*
First Time Locutus
Locutus locutus
References () https://github.com/locutusjs/locutus/releases/tag/v3.0.14 - () https://github.com/locutusjs/locutus/releases/tag/v3.0.14 - Product, Release Notes
References () https://github.com/locutusjs/locutus/security/advisories/GHSA-vh9h-29pq-r5m8 - () https://github.com/locutusjs/locutus/security/advisories/GHSA-vh9h-29pq-r5m8 - Exploit, Mitigation, Patch, Vendor Advisory

13 Mar 2026, 19:54

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-13 19:54

Updated : 2026-03-19 13:48


NVD link : CVE-2026-32304

Mitre link : CVE-2026-32304

CVE.ORG link : CVE-2026-32304


JSON object : View

Products Affected

locutus

  • locutus
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')