CVE-2026-23947 (CNNVD-202601-3316)
中文标题:
Orval 安全漏洞
英文标题:
Orval MCP client is vulnerable to code injection via unsanitized x-enum-descriptions in enum generation
漏洞描述
中文描述:
Orval是Orval开源的一个接口开发工具。 Orval 7.10.0版本至8.0.2之前版本存在安全漏洞,该漏洞源于x-enumDescriptions字段未经适当转义嵌入,可能导致任意代码执行。
英文描述:
Orval generates type-safe JS clients (TypeScript) from any valid OpenAPI v3 or Swagger v2 specification. Versions 7.10.0 until 8.0.2 are vulnerable to arbitrary code execution in environments consuming generated clients. This issue is similar in nature to CVE-2026-22785, but affects a different code path in @orval/core that was not addressed by CVE-2026-22785's fix. The vulnerability allows untrusted OpenAPI specifications to inject arbitrary TypeScript/JavaScript code into generated clients via the x-enumDescriptions field, which is embedded without proper escaping in getEnumImplementation(). I have confirmed that the injection occurs during const enum generation and results in executable code within the generated schema files. Orval 8.0.2 contains a fix for the issue.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| orval-labs | orval | >= 7.10.0, < 8.0.2 | - | - |
cpe:2.3:a:orval-labs:orval:>=_7.10.0,_<_8.0.2:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
4.0 (cna)
HIGHCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2026-23947 |
2026-01-20 02:19:58 | 2026-01-19 19:10:36 |
| NVD | nvd_CVE-2026-23947 |
2026-01-21 02:00:05 | 2026-01-20 22:00:20 |
| CNNVD | cnnvd_CNNVD-202601-3316 |
2026-01-26 02:10:03 | 2026-01-25 18:11:55 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202601-3316
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']