On January 21, 2026, the CERT Coordination Center (CERT/CC) issued an alert for CVE-2026-1245, a significant code execution vulnerability in 'binary-parser', a widely-used npm library for Node.js. The vulnerability allows an attacker to inject and execute arbitrary JavaScript code within the context of the Node.js process. The root cause is the library's failure to sanitize user input when dynamically generating parser code at runtime. This flaw represents a serious software supply chain risk, as it can be triggered in any application that uses 'binary-parser' to process data from an untrusted source. A patch has been released in version 2.3.0, and all developers using this library are advised to update immediately.
binary-parser npm library versions prior to 2.3.0.Function constructor (new Function(...)). However, it fails to properly sanitize all user-supplied input that is incorporated into this dynamically generated code. An attacker who can control the input being parsed can inject malicious JavaScript code. This code is then executed by the Function constructor, leading to arbitrary code execution.// Simplified conceptual example
var userInput = '});require("child_process").execSync("touch /tmp/pwned");//';
var codeString = 'return new Parser().string("message", { length: ' + userInput + ' });';
// The library effectively does this, leading to code injection
var func = new Function('Parser', codeString);
Any Node.js application that uses the 'binary-parser' npm library (versions before 2.3.0) to parse data from an untrusted source is vulnerable. This includes applications processing:
A proof-of-concept is publicly available. Given the popularity of the library, it is likely that threat actors will begin scanning for and exploiting this vulnerability in public-facing applications.
This is a classic software supply chain vulnerability. A single flaw in a popular, low-level library can introduce a critical vulnerability into thousands of downstream applications. A successful exploit of CVE-2026-1245 allows an attacker to achieve Remote Code Execution (RCE) on the server running the Node.js application. This could lead to a complete server compromise, data theft, lateral movement within the network, and deployment of further malware.
binary-parser library.package.json and package-lock.json files for the presence of binary-parser and check its version.binary-parser library to the patched version 2.3.0 or later. This can be done by running the following command in your project directory:npm install binary-parser@latest
Or, if using yarn:yarn upgrade binary-parser --latest
This action directly corresponds to MITRE ATT&CK Mitigation M1051 - Update Software.node_modules directory and package-lock.json file, then run npm install again to ensure a clean installation of the patched dependency tree.Update the 'binary-parser' library to the patched version 2.3.0 or later.
Mapped D3FEND Techniques:
Use Software Composition Analysis (SCA) tools to proactively identify and manage vulnerabilities in open-source dependencies.
The immediate and essential action for all Node.js development teams is to address this supply chain vulnerability by updating the 'binary-parser' library. Use your package manager to upgrade to version 2.3.0 or higher across all projects. This is a critical fix because the vulnerability allows for code injection, which can be easily turned into remote code execution on your application servers. After updating the dependency in package.json, it is crucial to delete the package-lock.json file and the node_modules directory, then run a fresh npm install or yarn to ensure that the patched version is pulled in and no vulnerable sub-dependencies remain.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats