logo

CVE-2025-1302 jsonpath-plus

Package

Manager: npm
Name: jsonpath-plus
Vulnerable Version: >=0 <10.3.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

EPSS: 0.34098 pctl0.96838

Details

JSONPath Plus allows Remote Code Execution Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode. **Note:** This is caused by an incomplete fix for CVE-2024-21534.

Metadata

Created: 2025-02-15T06:30:51Z
Modified: 2025-02-18T19:25:34Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/02/GHSA-hw8r-x6gr-5gjp/GHSA-hw8r-x6gr-5gjp.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-hw8r-x6gr-5gjp
Finding: F422
Auto approve: 1