Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode.
**Note:**
This is caused by an incomplete fix for [CVE-2024-21534](https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884).
Metrics
Affected Vendors & Products
References
History
Tue, 18 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 18 Feb 2025 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | jsonpath-plus: Remote Code Execution in jsonpath-plus via Improper Input Sanitization | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Sat, 15 Feb 2025 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode. **Note:** This is caused by an incomplete fix for [CVE-2024-21534](https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884). | |
Weaknesses | CWE-94 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: snyk
Published: 2025-02-15T05:00:01.061Z
Updated: 2025-02-18T20:32:41.833Z
Reserved: 2025-02-14T13:41:24.175Z
Link: CVE-2025-1302

Updated: 2025-02-18T20:32:35.560Z

Status : Received
Published: 2025-02-15T05:15:11.683
Modified: 2025-02-15T05:15:11.683
Link: CVE-2025-1302
