protobufjs Security Update Fixes Critical DoS Vulnerability in Code Generator
A critical denial-of-service vulnerability has been identified in protobufjs, the widely-used Protocol Buffers implementation for JavaScript. Tracked as CVE-2026-44294 (GHSA-2pr8-phx7-x9h3), the flaw allows attackers to trigger service disruptions through crafted field names in generated code.
The vulnerability stems from protobufjs's code generator failing to properly escape control characters in field and oneof names when producing JavaScript property accessors. Versions prior to 7.5.6 are affected. Applications that parse untrusted protobuf schemas or accept schema definitions from external sources face the highest risk, as maliciously constructed field names could be embedded to cause resource exhaustion or crashes during code generation.
The patched version 7.5.6 is now available via npm. Given protobufjs's extensive adoption across Node.js, microservices frameworks, and cloud-native applications, this vulnerability represents a significant supply chain risk. Development teams are advised to audit their dependency trees immediately and apply the update as a priority. Environments handling untrusted input or operating at scale should treat this as an urgent remediation item.