CVE-2026-1615 PUBLISHED

Assigner: snyk
Reserved: 29.01.2026 Published: 09.02.2026 Updated: 09.02.2026

All versions of the package jsonpath are vulnerable to Arbitrary Code Injection via unsafe evaluation of user-supplied JSON Path expressions. The library relies on the static-eval module to process JSON Path input, which is not designed to handle untrusted data safely. An attacker can exploit this vulnerability by supplying a malicious JSON Path expression that, when evaluated, executes arbitrary JavaScript code, leading to Remote Code Execution in Node.js environments or Cross-site Scripting (XSS) in browser contexts. This affects all methods that evaluate JSON Paths against objects, including .query, .nodes, .paths, .value, .parent, and .apply.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
CVSS Score: 9.2

Product Status

Vendor n/a
Product jsonpath
Versions
  • affected from 0 to * (excl.)
Vendor n/a
Product org.webjars.npm:jsonpath
Versions
  • affected from 0 to * (excl.)

Credits

  • Nick Copi

References

Problem Types

  • Arbitrary Code Injection