Description
Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval=’safe’ mode.
Note:
This is caused by an incomplete fix for CVE-2024-21534.
Recommendation
Update the jsonpath-plus
package to the latest compatible version. Followings are version details:
- Affected version(s): < 10.3.0
- Patched version(s): 10.3.0
References
Related Issues
- Directory Traversal in node-simple-router - CVE-2017-16083
- csvjson vulnerable to prototype injection - CVE-2025-57318
- Prebid.js NPM package briefly compromised - CVE-2025-59038
- devalue prototype pollution vulnerability - CVE-2025-57820
- Tags:
- npm
- jsonpath-plus
Anything's wrong? Let us know Last updated on February 18, 2025