The jsonpath package uses static-eval to evaluate filter expressions without proper sanitization. This allows malicious input in JSONPath expressions to execute arbitrary JavaScript in both Node.js (RCE) and browser (XSS) environments.
Version 1.2.1 is still vulnerable — the issue persists.
I tested with jsonpath v1.2.1, and the unsafe expression evaluation still appears to be exploitable.
Is there a planned fix or patched release for this vulnerability?