Description
Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval=’safe’ mode.
Note:
This is caused by an incomplete fix for CVE-2024-21534.
Recommendation
Update the jsonpath-plus package to the latest compatible version. Followings are version details:
- Affected version(s): < 10.3.0
- Patched version(s): 10.3.0
References
Related Issues
- JSONPath Plus Remote Code Execution (RCE) Vulnerability - CVE-2024-21534
- DocsGPT Allows Remote Code Execution - CVE-2025-0868
- Lobe Chat Desktop vulnerable to Remote Code Execution via XSS in Chat Messages - CVE-2025-59417
- Happy DOM: VM Context Escape can lead to Remote Code Execution - CVE-2025-61927
- Tags:
- npm
- jsonpath-plus
Anything's wrong? Let us know Last updated on February 18, 2025