CVE-2025-1302
CRITICAL EXPLOITED NUCLEINPM Jsonpath-plus < 10.3.0 - Code Injection
Title source: ruleDescription
Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode. **Note:** This is caused by an incomplete fix for [CVE-2024-21534](https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884).
Exploits (3)
nomisec
WORKING POC
1 stars
by abrewer251 · remote
https://github.com/abrewer251/CVE-2025-1302_jsonpath-plus_RCE
Nuclei Templates (1)
JSONPath Plus < 10.3.0 - Remote Code Execution
CRITICALVERIFIEDby Jaenact
References (4)
Scores
CVSS v3
9.8
EPSS
0.8909
EPSS Percentile
99.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2025-11-19
CWE
CWE-94
Status
published
Products (2)
n/a/jsonpath-plus
< 10.3.0
npm/jsonpath-plus
0 - 10.3.0npm
Published
Feb 15, 2025
Tracked Since
Feb 18, 2026