**Note:**
This is caused by an incomplete fix for [CVE-2024-21534](https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884).
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hw8r-x6gr-5gjp | JSONPath Plus allows Remote Code Execution |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 18 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 18 Feb 2025 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | jsonpath-plus: Remote Code Execution in jsonpath-plus via Improper Input Sanitization | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Sat, 15 Feb 2025 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode. **Note:** This is caused by an incomplete fix for [CVE-2024-21534](https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884). | |
| Weaknesses | CWE-94 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-02-18T20:32:41.833Z
Reserved: 2025-02-14T13:41:24.175Z
Link: CVE-2025-1302
Updated: 2025-02-18T20:32:35.560Z
Status : Received
Published: 2025-02-15T05:15:11.683
Modified: 2025-02-15T05:15:11.683
Link: CVE-2025-1302
OpenCVE Enrichment
No data.
Github GHSA