Impact
This vulnerability allows a malicious actor to supply a crafted JSON Path expression that is processed by the library’s static-eval module, resulting in uncontrolled execution of JavaScript code. The flaw can lead to Remote Code Execution in a Node.js environment or Cross‑Site Scripting when the library runs in a browser, because the library evaluates the expression without sanitizing user input. The weakness is identified as a Code Injection (CWE‑94).
Affected Systems
The issue affects the npm package "jsonpath" and the corresponding Webjars NPM variant "org.webjars.npm:jsonpath" for all releases prior to version 1.3.0. Any project that imports this library and uses its query, nodes, paths, value, parent, or apply methods is potentially exposed.
Risk and Exploitability
With a CVSS score of 9.2, the vulnerability poses a high severity risk. Exploitation likelihood is low as indicated by an EPSS score below 1%, and it is not yet listed in the CISA KEV catalog. Nonetheless, if the application accepts untrusted data for JSON Path evaluation, an attacker can trigger the unsafe evaluation, either from a remote request or local code, achieving arbitrary code execution. The attack vector is inferred to be remote or local depending on whether the library processes user‑supplied input.
OpenCVE Enrichment
Github GHSA