Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. jsonpath-plus
  4. ›
  5. CVE-2025-1302

CVE-2025-1302: JSONPath Plus allows Remote Code Execution

February 15, 2025 (updated February 18, 2025)

Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval=‘safe’ mode.

Note:

This is caused by an incomplete fix for CVE-2024-21534.

References

  • gist.github.com/nickcopi/11ba3cb4fdee6f89e02e6afae8db6456
  • github.com/JSONPath-Plus/JSONPath
  • github.com/JSONPath-Plus/JSONPath/blob/8e4acf8aff5f446aa66323e12394ac5615c3b260/src/Safe-Script.js
  • github.com/JSONPath-Plus/JSONPath/commit/30942896d27cb8a806b965a5ca9ef9f686be24ee
  • github.com/advisories/GHSA-hw8r-x6gr-5gjp
  • nvd.nist.gov/vuln/detail/CVE-2024-21534
  • nvd.nist.gov/vuln/detail/CVE-2025-1302
  • security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-8719585

Code Behaviors & Features

Detect and mitigate CVE-2025-1302 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 10.3.0

Fixed versions

  • 10.3.0

Solution

Upgrade to version 10.3.0 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

npm/jsonpath-plus/CVE-2025-1302.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:42 +0000.