{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-24132","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-01-21T18:38:22.474Z","datePublished":"2026-01-22T23:47:45.846Z","dateUpdated":"2026-01-23T20:01:12.356Z"},"containers":{"cna":{"title":"Orval Mock Generation Code Injection via const","problemTypes":[{"descriptions":[{"cweId":"CWE-77","lang":"en","description":"CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"PASSIVE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":7.7,"baseSeverity":"HIGH","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0"}}],"references":[{"name":"https://github.com/orval-labs/orval/security/advisories/GHSA-f456-rf33-4626","tags":["x_refsource_CONFIRM"],"url":"https://github.com/orval-labs/orval/security/advisories/GHSA-f456-rf33-4626"},{"name":"https://github.com/orval-labs/orval/pull/2828","tags":["x_refsource_MISC"],"url":"https://github.com/orval-labs/orval/pull/2828"},{"name":"https://github.com/orval-labs/orval/pull/2829","tags":["x_refsource_MISC"],"url":"https://github.com/orval-labs/orval/pull/2829"},{"name":"https://github.com/orval-labs/orval/pull/2830","tags":["x_refsource_MISC"],"url":"https://github.com/orval-labs/orval/pull/2830"},{"name":"https://github.com/orval-labs/orval/commit/44ca8c1f5f930a3e4cefb6b79b38bcde7f8532a5","tags":["x_refsource_MISC"],"url":"https://github.com/orval-labs/orval/commit/44ca8c1f5f930a3e4cefb6b79b38bcde7f8532a5"},{"name":"https://github.com/orval-labs/orval/commit/6d8ece07ccb80693ad43edabccb3957aceadcd06","tags":["x_refsource_MISC"],"url":"https://github.com/orval-labs/orval/commit/6d8ece07ccb80693ad43edabccb3957aceadcd06"},{"name":"https://github.com/orval-labs/orval/commit/9b211cddc9f009f8a671e4ac5c6cb72cd8646b62","tags":["x_refsource_MISC"],"url":"https://github.com/orval-labs/orval/commit/9b211cddc9f009f8a671e4ac5c6cb72cd8646b62"},{"name":"https://github.com/orval-labs/orval/releases/tag/v7.20.0","tags":["x_refsource_MISC"],"url":"https://github.com/orval-labs/orval/releases/tag/v7.20.0"},{"name":"https://github.com/orval-labs/orval/releases/tag/v8.0.3","tags":["x_refsource_MISC"],"url":"https://github.com/orval-labs/orval/releases/tag/v8.0.3"}],"affected":[{"vendor":"orval-labs","product":"orval","versions":[{"version":"< 7.20.0","status":"affected"},{"version":">= 8.0.0-rc.0, < 8.0.3","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-01-22T23:47:45.846Z"},"descriptions":[{"lang":"en","value":"Orval generates type-safe JS clients (TypeScript) from any valid OpenAPI v3 or Swagger v2 specification. Versions \n7.19.0 and below and 8.0.0-rc.0 through 8.0.2 allow untrusted OpenAPI specifications to inject arbitrary TypeScript/JavaScript into generated mock files via the const keyword on schema properties. These const values are interpolated into the mock scalar generator (getMockScalar in packages/mock/src/faker/getters/scalar.ts) without proper escaping or type-safe serialization, which results in attacker-controlled code being emitted into both interface definitions and faker/MSW handlers. The vulnerability is similar in impact to the previously reported enum x-enumDescriptions (GHSA-h526-wf6g-67jv), but it affects a different code path in the faker-based mock generator rather than @orval/core. The issue has been fixed in versions 7.20.0 and 8.0.3."}],"source":{"advisory":"GHSA-f456-rf33-4626","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-23T20:00:52.884919Z","id":"CVE-2026-24132","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-23T20:01:12.356Z"}}]}}