Dismissed
Permalink
CVE-2026-1615
9.8 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
27 packages
- rubyPackages.jsonpath
- haskellPackages.jsonpath
- rubyPackages_3_1.jsonpath
- rubyPackages_3_2.jsonpath
- rubyPackages_3_3.jsonpath
- rubyPackages_3_4.jsonpath
- rubyPackages_4_0.jsonpath
- python312Packages.jsonpath
- python313Packages.jsonpath
- python314Packages.jsonpath
- typstPackages.jsonpath_0_1_0
- python312Packages.jsonpath-ng
- python312Packages.jsonpath-rw
- python313Packages.jsonpath-ng
- python313Packages.jsonpath-rw
- python314Packages.jsonpath-ng
- python314Packages.jsonpath-rw
- haskellPackages.aeson-jsonpath
- python312Packages.bc-jsonpath-ng
- python313Packages.bc-jsonpath-ng
- python314Packages.bc-jsonpath-ng
- python312Packages.jsonpath-python
- python312Packages.python-jsonpath
- python313Packages.jsonpath-python
- python313Packages.python-jsonpath
- python314Packages.jsonpath-python
- python314Packages.python-jsonpath
- @LeSuisse dismissed
All versions of the package jsonpath are vulnerable to Arbitrary …
All versions of the package jsonpath are vulnerable to Arbitrary Code Injection via unsafe evaluation of user-supplied JSON Path expressions. The library relies on the static-eval module to process JSON Path input, which is not designed to handle untrusted data safely. An attacker can exploit this vulnerability by supplying a malicious JSON Path expression that, when evaluated, executes arbitrary JavaScript code, leading to Remote Code Execution in Node.js environments or Cross-site Scripting (XSS) in browser contexts. This affects all methods that evaluate JSON Paths against objects, including .query, .nodes, .paths, .value, .parent, and .apply.
References
- https://security.snyk.io/vuln/SNYK-JS-JSONPATH-13645034
- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-15141219
- https://github.com/dchester/jsonpath/blob/c1dd8ec74034fb0375233abb5fdbec51ac317…
- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-15141219
- https://github.com/dchester/jsonpath/blob/c1dd8ec74034fb0375233abb5fdbec51ac317…
- https://github.com/dchester/jsonpath/commit/9631412641b7095f86840a7a45b5b3afc68…
- https://security.snyk.io/vuln/SNYK-JS-JSONPATH-13645034
Affected products
jsonpath
- *
- <1.2.0
org.webjars.npm:jsonpath
- *
- <1.2.0