Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-26831
March 25, 2026
textract through 2.5.0 is vulnerable to OS Command Injection via the file path parameter in multiple extractors. When processing files with malicious filenames, the filePath is passed directly to child_process.exec() in lib/extractors/doc.js, rtf.js, dxf.js, images.js, and lib/util.js with inadequate sanitization
Affected Packages
github.com/nats-io/nats-server/v2 (GO):
Affected version(s) >=v2.0.0-RC14.0.20190604014547-ed1901c79292 <v2.11.15
Fix Suggestion:
Update to version v2.11.15
github.com/nats-io/nats-server/v2 (GO):
Affected version(s) >=v2.0.0-RC14.0.20190604014547-ed1901c79292 <v2.11.15
Fix Suggestion:
Update to version v2.11.15
github.com/nats-io/nats-server/v2 (GO):
Affected version(s) >=v2.12.0 <v2.12.6
Fix Suggestion:
Update to version v2.12.6
github.com/nats-io/nats-server/v2 (GO):
Affected version(s) >=v2.0.0-RC14.0.20190604014547-ed1901c79292 <v2.11.15
Fix Suggestion:
Update to version v2.11.15
github.com/nats-io/nats-server/v2 (GO):
Affected version(s) >=v2.12.0 <v2.12.6
Fix Suggestion:
Update to version v2.12.6
github.com/nats-io/nats-server/v2 (GO):
Affected version(s) >=v2.12.0 <v2.12.6
Fix Suggestion:
Update to version v2.12.6
Do you need more information?
Contact Us
CVSS v3
Base Score:
6.1
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Improper Control of Generation of Code ('Code Injection')
EPSS
Base Score:
0.16