CVE-2026-41507 POC (Proof-of-Concept)

CVE-2026-41507 POC (Proof-of-Concept)

math-codegen generates code from mathematical expressions. Prior to version 0.4.3, string literal content passed to cg.parse() is injected verbatim into a new Function() body without sanitization. This allows an attacker to execute arbitrary system commands when user-controlled input reaches the parser. Any application exposing a math evaluation endpoint where user input flows into cg.parse() is vulnerable to full RCE. This issue has been patched in version 0.4.3.

Published: 2026-05-08

CVSS: 9.8

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Download CVE-2026-41507 POC (Proof-of-Concept) here:

Tip: Download official Tor Browser at https://www.torproject.org/download/ to access .onion links.

https://hokyo.gr/poc-165-cve-2026-7049/

https://hokyo.gr/poc-178-cve-2026-7610/

https://hokyo.gr/poc-580-cve-2026-7913/

https://hokyo.gr/poc-803-cve-2026-8129/

Copyright 2017- 2025 Hokyo JapanEats ©