Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @babel/plugin-transform-modules-systemjs
  4. ›
  5. CVE-2026-44728

CVE-2026-44728: @babel/plugin-transform-modules-systemjs generates arbitrary code when compiling malicious input

May 8, 2026

Using Babel to compile code that was specifically crafted by an attacker can cause Babel to generate output code that executes arbitrary code.

Known affected plugins are:

  • @babel/plugin-transform-modules-systemjs
  • @babel/preset-env when using the modules: "systemjs" option, as it delegates to @babel/plugin-transform-modules-systemjs

No other plugins under the @babel namespace are impacted.

Users that only compile trusted code are not impacted.

References

  • github.com/advisories/GHSA-fv7c-fp4j-7gwp
  • github.com/babel/babel
  • github.com/babel/babel/security/advisories/GHSA-fv7c-fp4j-7gwp
  • nvd.nist.gov/vuln/detail/CVE-2026-44728

Code Behaviors & Features

Detect and mitigate CVE-2026-44728 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 7.12.0 before 7.29.4, all versions starting from 8.0.0-alpha.0 before 8.0.0-alpha.13

Fixed versions

  • 7.29.4
  • 8.0.0-alpha.13

Solution

Upgrade to versions 7.29.4, 8.0.0-alpha.13 or above.

Impact 8.2 HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')
  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

npm/@babel/plugin-transform-modules-systemjs/CVE-2026-44728.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 00:19:02 +0000.