Any application built on Node.js that uses protobuf.js for API communication, microservice messaging, or gRPC could allow an attacker to execute code directly on the server, with no authentication required if the service accepts external schema input. Successful exploitation could result in data exfiltration, ransomware deployment, or persistent backdoor access — all with the same privileges as the compromised service. Given the library's presence across the npm supply chain, organizations may be exposed through direct dependencies or through third-party software they did not write.
You Are Affected If
You run protobufjs version 7.x below 7.5.4 in any Node.js application or service
You run protobufjs version 8.0.0 or below and have not confirmed a patch is available and applied
Your application accepts Protocol Buffer schema definitions (.proto files or equivalent) from any source other than your own bundled, trusted application code
You operate APIs, microservices, or gRPC endpoints built on Node.js that use protobuf.js for message parsing
You have not run 'npm audit' or equivalent SCA tooling against your dependency tree since April 15, 2026
Board Talking Points
A critical flaw in a JavaScript library used by approximately 50 million projects weekly allows attackers to take full control of affected servers with no authentication — a public exploit is already available.
Engineering teams should be directed to audit and patch all affected systems within 24–48 hours, prioritizing any service that accepts external or user-supplied data.
Organizations that delay remediation face a material risk of server compromise, data theft, or ransomware deployment through a well-documented, publicly exploitable attack path.