CVE-2024-21534
CRITICALNPM Jsonpath-plus < 10.2.0 - Code Injection
Title source: ruleDescription
All versions of the package jsonpath-plus are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. **Note:** There were several attempts to fix it in versions [10.0.0-10.1.0](https://github.com/JSONPath-Plus/JSONPath/compare/v9.0.0...v10.1.0) but it could still be exploited using [different payloads](https://github.com/JSONPath-Plus/JSONPath/issues/226).
Exploits (4)
nomisec
WORKING POC
1 stars
by BohemianHacks · poc
https://github.com/BohemianHacks/CVE-2024-21534-poc
References (4)
Scores
CVSS v3
9.8
EPSS
0.9271
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-94
Status
published
Products (4)
n/a/jsonpath-plus
n/a/org.webjars.npm:jsonpath-plus
npm/jsonpath-plus
0 - 10.2.0npm
org.webjars.npm/jsonpath-plus
0Maven
Published
Oct 11, 2024
Tracked Since
Feb 18, 2026