CVE-2025-1302 – jsonpath-plus
Package
Manager: npm
Name: jsonpath-plus
Vulnerable Version: >=0 <10.3.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
EPSS: 0.34098 pctl0.96838
Details
JSONPath Plus allows Remote Code Execution Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode. **Note:** This is caused by an incomplete fix for CVE-2024-21534.
Metadata
Created: 2025-02-15T06:30:51Z
Modified: 2025-02-18T19:25:34Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/02/GHSA-hw8r-x6gr-5gjp/GHSA-hw8r-x6gr-5gjp.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-hw8r-x6gr-5gjp
Finding: F422
Auto approve: 1