Description
Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval=’safe’ mode.
Note:
This is caused by an incomplete fix for CVE-2024-21534.
Recommendation
Update the jsonpath-plus package to the latest compatible version. Followings are version details:
- Affected version(s): < 10.3.0
- Patched version(s): 10.3.0
References
Related Issues
- Angular vulnerable to Cross-site Scripting - CVE-2020-7676
- rollbar vulnerable to prototype pollution - CVE-2025-57325
- csvjson vulnerable to prototype injection - CVE-2025-57318
- Prebid.js NPM package briefly compromised - CVE-2025-59038
- Tags:
- npm
- jsonpath-plus
Anything's wrong? Let us know Last updated on February 18, 2025