logo

CVE-2019-10758 mongo-express

Package

Manager: npm
Name: mongo-express
Vulnerable Version: >=0 <0.54.0

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.94361 pctl0.99958

Details

Remote Code Execution Vulnerability in NPM mongo-express ### Impact Remote code execution on the host machine by any authenticated user. ### Proof Of Concept Launching mongo-express on a Mac, pasting the following into the "create index" field will pop open the Mac calculator: ```javascript this.constructor.constructor("return process")().mainModule.require('child_process').execSync('/Applications/Calculator.app/Contents/MacOS/Calculator') ``` ### Patches Users should upgrade to version `0.54.0` ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com) #### Thanks @JLLeitschuh for finding and reporting this vulnerability This vulnerability has been [exploited](https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-10758) in the wild.

Metadata

Created: 2019-12-30T19:30:31Z
Modified: 2025-07-28T20:04:38Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/12/GHSA-h47j-hc6x-h3qq/GHSA-h47j-hc6x-h3qq.json
CWE IDs: ["CWE-78", "CWE-94"]
Alternative ID: GHSA-h47j-hc6x-h3qq
Finding: F004
Auto approve: 1