<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>@Babel/Preset-Env — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/@babel/preset-env/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 08 May 2026 20:34:07 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/@babel/preset-env/feed.xml" rel="self" type="application/rss+xml"/><item><title>Babel Plugin Vulnerability Leads to Arbitrary Code Execution via Malicious Input</title><link>https://feed.craftedsignal.io/briefs/2024-01-08-babel-code-execution/</link><pubDate>Fri, 08 May 2026 20:34:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-08-babel-code-execution/</guid><description>A maliciously crafted input to Babel's `@babel/plugin-transform-modules-systemjs` or `@babel/preset-env` with `modules: 'systemjs'` can cause the tool to generate arbitrary code execution.</description><content:encoded><![CDATA[<p>A vulnerability exists in Babel&rsquo;s <code>@babel/plugin-transform-modules-systemjs</code> plugin and <code>@babel/preset-env</code> when configured with the <code>modules: &quot;systemjs&quot;</code> option. An attacker can supply a specially crafted input to Babel, causing the tool to generate malicious output code that results in arbitrary code execution when processed. This vulnerability impacts versions of <code>@babel/plugin-transform-modules-systemjs</code> between 7.12.0 and 7.29.3, as well as versions between 8.0.0-alpha.0 and 8.0.0-alpha.12. The <code>@babel/preset-env</code> is vulnerable when it uses the vulnerable <code>@babel/plugin-transform-modules-systemjs</code>. This vulnerability, reported by Daniel Cervera, does not affect users who only compile trusted code, meaning developers who compile user-submitted code are at higher risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious JavaScript input file designed to exploit the code generation flaw in Babel.</li>
<li>The attacker provides the malicious JavaScript file to a vulnerable Babel instance for compilation. This could occur through various means, such as a build process.</li>
<li>Babel, using either <code>@babel/plugin-transform-modules-systemjs</code> or <code>@babel/preset-env</code> with the <code>modules: &quot;systemjs&quot;</code> option, processes the malicious input file.</li>
<li>Due to the vulnerability, Babel generates a malicious JavaScript output file containing attacker-controlled code.</li>
<li>The generated malicious JavaScript file is then included in a web application or other JavaScript runtime environment.</li>
<li>A user or process executes the malicious JavaScript code.</li>
<li>The attacker-controlled code executes arbitrary commands on the system or within the application&rsquo;s context.</li>
<li>The attacker gains unauthorized access, modifies data, or disrupts services, depending on the permissions available to the executed code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to execute arbitrary code in the context of the Babel process. This can lead to a variety of impacts, including but not limited to, unauthorized access to sensitive data, modification of application code, or complete system compromise, depending on where and how the compiled code is used. The severity is high because it can potentially give an attacker complete control over the system if the compiled output is run in a privileged environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>@babel/plugin-transform-modules-systemjs</code> to version 7.29.4 or later. If using <code>@babel/preset-env</code>, upgrade to version 7.29.5 to pull in the updated <code>@babel/plugin-transform-modules-systemjs</code> dependency.</li>
<li>Apply the provided Sigma rule <code>Detect CVE-2026-44728 Babel Code Generation Vulnerability</code> to identify potential exploitation attempts based on process execution with Babel.</li>
<li>Consider migrating away from the <code>modules: &quot;systemjs&quot;</code> option to native ES Modules or other module formats to avoid this type of vulnerability.</li>
<li>If immediate patching is not possible, and you&rsquo;re working with a legacy codebase, consider pinning <code>@babel/parser</code> to v7.11.5, however, be aware of the potential impact on other language features.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>code-generation</category><category>arbitrary-code-execution</category><category>babel</category></item></channel></rss>