Sign up for FREE to recieve instant alerts about this vulnerability!
Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode. **Note:** This is caused by an incomplete fix for [CVE-2024-21534](https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884).
CVE ID: CVE-2025-1302
CVSS Base Severity: CRITICAL
CVSS Base Score: 9.3
CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
Vendor: n/a
Product: jsonpath-plus
EPSS Score: 0.05% (probability of being exploited)
EPSS Percentile: 0.18435 (how common is this exploit)
EPSS Date: 2025-03-13 (when was this score calculated)