Skip to content

Security: CVE-2026-1615 – Arbitrary Code Execution via unsanitized JSONPath expressions (static-eval) #199

@Fnu-DevX

Description

@Fnu-DevX

The jsonpath package uses static-eval to evaluate filter expressions without proper sanitization. This allows malicious input in JSONPath expressions to execute arbitrary JavaScript in both Node.js (RCE) and browser (XSS) environments.

Version 1.2.1 is still vulnerable — the issue persists.

I tested with jsonpath v1.2.1, and the unsafe expression evaluation still appears to be exploitable.

Is there a planned fix or patched release for this vulnerability?

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions