**Note:**
This is caused by an incomplete fix for [CVE-2024-21534](https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884).
No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hw8r-x6gr-5gjp | JSONPath Plus allows Remote Code Execution |
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 18 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 18 Feb 2025 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | jsonpath-plus: Remote Code Execution in jsonpath-plus via Improper Input Sanitization | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Sat, 15 Feb 2025 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode. **Note:** This is caused by an incomplete fix for [CVE-2024-21534](https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884). | |
| Weaknesses | CWE-94 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-02-18T20:32:41.833Z
Reserved: 2025-02-14T13:41:24.175Z
Link: CVE-2025-1302
Updated: 2025-02-18T20:32:35.560Z
Status : Deferred
Published: 2025-02-15T05:15:11.683
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-1302
OpenCVE Enrichment
No data.
Github GHSA