CVE-2026-39956 — jq is a command-line JSON processor. In commits after
Image via images.unsplash.com
CVE-2026-39956 — jq is a command-line JSON processor. In commits after 69785bf77f86e2ea1b4a20ca86775916889e91c9, the _strindices builtin in jq's src/builtin.c passes its arguments directly to jv_string_indexes() without verifying they are strings, and jv_string_indexes() in src/jv.c relies solely on
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-39956 | vulnerability | CVE-2026-39956 |
| CWE-125 | weakness | CWE-125 |
| CWE-476 | weakness | CWE-476 |
| CWE-843 | weakness | CWE-843 |
🔎
Turn this CVE into SIEM detection coverage
Generate detection rules for Splunk, Sentinel, QRadar & Elastic — straight from this vulnerability. Use /detect in the Intel Bot.
Open Intel Bot →
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 14, 2026 at 02:16 UTC |
This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.
Believe this infringes your rights? Submit a takedown request.