Nixpkgs Security Tracker

Login with GitHub

Suggestion detail

Dismissed
Permalink CVE-2026-1615
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 month, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    27 packages
    • rubyPackages.jsonpath
    • haskellPackages.jsonpath
    • rubyPackages_3_1.jsonpath
    • rubyPackages_3_2.jsonpath
    • rubyPackages_3_3.jsonpath
    • rubyPackages_3_4.jsonpath
    • rubyPackages_4_0.jsonpath
    • python312Packages.jsonpath
    • python313Packages.jsonpath
    • python314Packages.jsonpath
    • typstPackages.jsonpath_0_1_0
    • python312Packages.jsonpath-ng
    • python312Packages.jsonpath-rw
    • python313Packages.jsonpath-ng
    • python313Packages.jsonpath-rw
    • python314Packages.jsonpath-ng
    • python314Packages.jsonpath-rw
    • haskellPackages.aeson-jsonpath
    • python312Packages.bc-jsonpath-ng
    • python313Packages.bc-jsonpath-ng
    • python314Packages.bc-jsonpath-ng
    • python312Packages.jsonpath-python
    • python312Packages.python-jsonpath
    • python313Packages.jsonpath-python
    • python313Packages.python-jsonpath
    • python314Packages.jsonpath-python
    • python314Packages.python-jsonpath
  • @LeSuisse dismissed
All versions of the package jsonpath are vulnerable to Arbitrary …

All versions of the package jsonpath are vulnerable to Arbitrary Code Injection via unsafe evaluation of user-supplied JSON Path expressions. The library relies on the static-eval module to process JSON Path input, which is not designed to handle untrusted data safely. An attacker can exploit this vulnerability by supplying a malicious JSON Path expression that, when evaluated, executes arbitrary JavaScript code, leading to Remote Code Execution in Node.js environments or Cross-site Scripting (XSS) in browser contexts. This affects all methods that evaluate JSON Paths against objects, including .query, .nodes, .paths, .value, .parent, and .apply.

Affected products

jsonpath
  • *
  • <1.2.0
org.webjars.npm:jsonpath
  • *
  • <1.2.0
JS dep, not directly packaged in nixpkgs.