CVE-2026-2265
Received Received - Intake
Unauthenticated RCE via Deserialization in Replicator npm

Publication date: 2026-04-01

Last updated on: 2026-04-01

Assigner: CERT/CC

Description
An unauthenticated remote code execution (RCE) vulnerability exists in applications that use the Replicator node package manager (npm) version 1.0.5 to deserialize untrusted user input and execute the resulting object.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-01
Last Modified
2026-04-01
Generated
2026-05-06
AI Q&A
2026-04-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
inukulin replicator to 1.0.5 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided context and resources do not explicitly discuss the impact of CVE-2026-2265 on compliance with common standards and regulations such as GDPR or HIPAA.


Can you explain this vulnerability to me?

CVE-2026-2265 is a critical remote code execution (RCE) vulnerability in the Replicator npm package version 1.0.5 and earlier. It arises from unsafe deserialization of untrusted user input, specifically during the reconstruction of Error objects. The vulnerability allows an attacker to control the "name" field in serialized input, which is used to select a constructor from the global scope without restriction. This enables the attacker to specify dangerous constructors like "Function" to execute arbitrary code on the victim's machine.

A proof of concept demonstrates this by crafting a JSON string that, when deserialized by replicator.decode(), executes a command such as opening the Calculator application. The root cause is the unsafe dynamic constructor resolution during deserialization, which was fixed by implementing a strict allowlist of safe error constructors to prevent arbitrary code execution.


How can this vulnerability impact me? :

This vulnerability can lead to remote code execution on systems using the vulnerable Replicator package. An attacker can send specially crafted serialized data that, when deserialized, executes arbitrary commands on the target system without authentication.

Such an exploit can compromise the confidentiality, integrity, and availability of affected systems by allowing attackers to run malicious code, potentially leading to data theft, system takeover, or disruption of services.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by identifying usage of the Replicator npm package version 1.0.5 or earlier in your applications, especially where untrusted user input is deserialized using replicator.decode().

A practical detection method involves monitoring or scanning for suspicious deserialization calls that use the replicator.decode() function with crafted JSON input containing Error objects with unusual "name" fields that could lead to code execution.

While no specific detection commands are provided in the resources, you can search your codebase for the usage of replicator.decode() and check the version of the replicator package installed.

  • Check replicator package version in your project: `npm list replicator`
  • Search code for usage of replicator.decode(): `grep -r "replicator.decode" ./`
  • Monitor logs or network traffic for JSON payloads containing suspicious Error objects with unusual "name" fields that could trigger unsafe deserialization.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading the Replicator package to a version that includes the security patch from PR #19, which implements a strict allowlist of safe error constructors to prevent unsafe deserialization.

Additional recommended actions are to avoid deserializing untrusted input with replicator.decode(), validate and sanitize all input before deserialization, and treat all deserialized objects as untrusted until properly validated.

  • Upgrade replicator package to a patched version that includes the fix from PR #19.
  • Implement strict allowlists for error constructors during deserialization to prevent arbitrary code execution.
  • Audit your codebase for unsafe usage of replicator.decode() and avoid deserializing data from untrusted sources.
  • Add security tests to detect unexpected constructor names or malicious payloads.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart