Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution

CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution

Posted on January 21, 2026January 21, 2026 By CWS

Ravie LakshmananJan 21, 2026Open Supply / Vulnerability
A safety vulnerability has been disclosed within the well-liked binary-parser npm library that, if efficiently exploited, may end result within the execution of arbitrary JavaScript.
The vulnerability, tracked as CVE-2026-1245 (CVSS rating: N/A), impacts all variations of the module previous to model 2.3.0, which addresses the problem. Patches for the flaw have been launched on November 26, 2025.
Binary-parser is a extensively used parser builder for JavaScript that permits builders to parse binary information. It helps a variety of widespread information varieties, together with integers, floating-point values, strings, and arrays. The bundle attracts roughly 13,000 downloads on a weekly foundation.
In response to an advisory launched by the CERT Coordination Middle (CERT/CC), the vulnerability has to do with a scarcity of sanitization of user-supplied values, corresponding to parser area names and encoding parameters, when the JavaScript parser code is dynamically generated at runtime utilizing the “Perform” constructor.

It is price noting that the npm library builds JavaScript supply code as a string that represents the parsing logic and compiles it utilizing the Perform constructor and caches it as an executable perform to parse buffers effectively.
Nonetheless, on account of CVE-2026-1245, an attacker-controlled enter may make its solution to the generated code with out sufficient validation, inflicting the applying to parse untrusted information, ensuing within the execution of arbitrary code. Purposes that use solely static, hard-coded parser definitions are usually not affected by the flaw.
“In affected functions that assemble parser definitions utilizing untrusted enter, an attacker could possibly execute arbitrary JavaScript code with the privileges of the Node.js course of,” CERT/CC stated. “This might permit entry to native information, manipulation of software logic, or execution of system instructions relying on the deployment surroundings.”
Safety researcher Maor Caplan has been credited with discovering and reporting the vulnerability. Customers of binary-parser are suggested to improve to model 2.3.0 and keep away from passing user-controlled values into parser area names or encoding parameters.

The Hacker News Tags:binaryparser, Bug, CERTCC, Code, Execution, Node.js, PrivilegeLevel, Warns

Post navigation

Previous Post: CISA Releases BRICKSTORM Malware Report with New YARA Rules for VMware vSphere
Next Post: LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords

Related Posts

North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign The Hacker News
Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data The Hacker News
Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks The Hacker News
Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate The Hacker News
Google Chrome Can Now Auto-Change Compromised Passwords Using Its Built-In Manager Google Chrome Can Now Auto-Change Compromised Passwords Using Its Built-In Manager The Hacker News
300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide 300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark