Skip to content

[GHSA-87r5-mp6g-5w5j] jsonpath has Arbitrary Code Injection via Unsafe Evaluation of JSON Path Expressions#6933

Open
Alina-Podoba wants to merge 1 commit intoAlina-Podoba/advisory-improvement-6933from
Alina-Podoba-GHSA-87r5-mp6g-5w5j
Open

[GHSA-87r5-mp6g-5w5j] jsonpath has Arbitrary Code Injection via Unsafe Evaluation of JSON Path Expressions#6933
Alina-Podoba wants to merge 1 commit intoAlina-Podoba/advisory-improvement-6933from
Alina-Podoba-GHSA-87r5-mp6g-5w5j

Conversation

@Alina-Podoba
Copy link

Updates

  • Affected products
  • CVSS v3
  • CVSS v4
  • Severity

Comments
Reviewing the source code of the newly released version 1.2.1 shows no substantial changes to the vulnerable evaluation logic in lib/handlers.js. It continues to rely on static-eval to process user-supplied JSON Path expressions, which is the root cause of the RCE vulnerability. Version 1.2.1 should NOT be listed as a patched version. There is currently no secure version of this package, and the advisory must be updated to prevent users from falling into a false sense of security by upgrading to an equally vulnerable version.

@github-actions github-actions bot changed the base branch from main to Alina-Podoba/advisory-improvement-6933 February 17, 2026 12:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant