Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2493 articles · 111754 vulns · 36/41 feeds (7d)
← Back to list
8.2
CVE-2026-32316EXPLOITED
jq · jq

jq: Integer overflow in jvp_string_append() allows Heap-based Buffer Overflow

Description

jq is a command-line JSON processor. An integer overflow vulnerability exists through version 1.8.1 within the jvp_string_append() and jvp_string_copy_replace_bad functions, where concatenating strings with a combined length exceeding 2^31 bytes causes a 32-bit unsigned integer overflow in the buffer allocation size calculation, resulting in a drastically undersized heap buffer. Subsequent memory copy operations then write the full string data into this undersized buffer, causing a heap buffer overflow classified as CWE-190 (Integer Overflow) leading to CWE-122 (Heap-based Buffer Overflow). Any system evaluating untrusted jq queries is affected, as an attacker can crash the process or potentially achieve further exploitation through heap corruption by crafting queries that produce extremely large strings. The root cause is the absence of string size bounds checking, unlike arrays and objects which already have size limits. The issue has been addressed in commit e47e56d226519635768e6aab2f38f0ab037c09e5.

Affected Products

VendorProductVersions
jqjq< e47e56d226519635768e6aab2f38f0ab037c09e5

References

  • https://github.com/jqlang/jq/security/advisories/GHSA-q3h9-m34w-h76f(x_refsource_CONFIRM)
  • https://github.com/jqlang/jq/commit/e47e56d226519635768e6aab2f38f0ab037c09e5(x_refsource_MISC)

Related News (2 articles)

Tier A
Microsoft MSRC2d ago
CVE-2026-32316 jq: Integer overflow in jvp_string_append() allows Heap-based Buffer Overflow
→ No new info (linked only)
Tier C
VulDB5d ago
CVE-2026-32316 | jqlang jq up to 1.8.1 jvp_string_append/jvp_string_copy_replace_bad heap-based overflow (GHSA-q3h9-m34w-h76f)
→ No new info (linked only)
CVSS 3.18.2 CRITICAL
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-122, CWE-190
PublishedApr 13, 2026
Last enriched5d agov2
Trending Score57
Source articles2
Independent2
Info Completeness8/14
Missing: epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (3)

HIGHCVE-2026-39979EXP
jq: Out-of-Bounds Read in jv_parse_sized() Error Formatting for Non-NUL-Terminated Counted Buffers
Trending: 58
HIGHCVE-2026-33948EXP
jq: Embedded-NUL Truncation in CLI JSON Input Path Causes Prefix-Only Validation of Malformed Input
Trending: 50
MEDIUMCVE-2026-33947EXP
jq: Unbounded Recursion in jv_setpath(), jv_getpath() and delpaths_sorted()
Trending: 48

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 13, 2026
Discovered by ZDM
Apr 13, 2026
Actively Exploited
Apr 13, 2026
Updated: severity, activelyExploited
Apr 13, 2026

Version History

v2
Last enriched 5d ago
v2Tier C5d ago

Updated severity to CRITICAL and marked the vulnerability as actively exploited.

severityactivelyExploited
via VulDB
v15d ago

Initial creation