Impact
CVE-2026-3955 exposes a code injection flaw in the runJSFile function of elecV2P’s jsfile Endpoint. The vulnerability, identified as CWE-74 and CWE-94, allows a remote attacker to submit malicious JavaScript that the server executes, resulting in arbitrary code execution. This flaw threatens the confidentiality, integrity, and availability of the affected system if exploited.
Affected Systems
The issue affects the elecV2P project for any deployment running version 3.8.3 or earlier. The vulnerability resides in the source file source-code/elecV2P-master/webser/wbjs.js within the jsfile Endpoint component. No other products or versions are presently documented as affected.
Risk and Exploitability
The CVSS score of 5.3 indicates medium severity, while an EPSS score below 1% suggests a low current likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog. However, the exploit has been publicly disclosed and can be triggered remotely via crafted requests to the vulnerable endpoint. Until an official patch is issued, the risk remains active.
OpenCVE Enrichment