GHSA-p6x5-p4xf-cc4r: Remote Code Execution (RCE) via String Literal Injection into math-codegen
String literal content passed to cg.parse() is injected verbatim into a new Function() body without sanitization. This allows an attacker to execute arbitrary system commands when user-controlled input reaches the parser. Any application exposing a math evaluation endpoint where user input flows into cg.parse() is vulnerable to full RCE.
References
Code Behaviors & Features
Detect and mitigate GHSA-p6x5-p4xf-cc4r with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →