CVE-2026-29091

8.1 HIGH

📋 TL;DR

This vulnerability allows remote code execution in applications using Locutus library versions before 3.0.0. Attackers can inject arbitrary JavaScript code through the call_user_func_array function, potentially taking full control of affected systems. Any application using vulnerable Locutus versions is affected.

💻 Affected Systems

Products:
  • Locutus
Versions: All versions before 3.0.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications that use the vulnerable call_user_func_array or call_user_func functions from Locutus.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary commands, steal sensitive data, install malware, or pivot to other systems.

🟠

Likely Case

Application compromise leading to data theft, service disruption, or unauthorized access to backend systems.

🟢

If Mitigated

Limited impact with proper input validation and sandboxing, potentially only affecting isolated application components.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires attacker to control callback parameters passed to vulnerable functions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.0

Vendor Advisory: https://github.com/locutusjs/locutus/security/advisories/GHSA-fp25-p6mj-qqg6

Restart Required: No

Instructions:

1. Update Locutus to version 3.0.0 or later using npm update locutus. 2. Verify the update with npm list locutus. 3. Test application functionality after update.

🔧 Temporary Workarounds

Input Validation

all

Implement strict input validation for all parameters passed to call_user_func_array and call_user_func functions.

Function Restriction

all

Restrict usage of vulnerable functions to trusted code paths only.

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all user-controlled data
  • Isolate applications using vulnerable versions in network segments with restricted access

🔍 How to Verify

Check if Vulnerable:

Check package.json or run npm list locutus to verify installed version is below 3.0.0

Check Version:

npm list locutus | grep locutus

Verify Fix Applied:

Confirm locutus version is 3.0.0 or higher with npm list locutus

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript execution patterns
  • Unexpected eval() calls
  • Suspicious function invocations

Network Indicators:

  • Unusual outbound connections from application servers
  • Unexpected data exfiltration patterns

SIEM Query:

source="application_logs" AND ("call_user_func_array" OR "call_user_func") AND suspicious_parameters

🔗 References

📤 Share & Export