CVE-2025-12735
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-05

Last updated on: 2026-02-10

Assigner: CERT/CC

Description
The expr-eval library is a JavaScript expression parser and evaluator designed to safely evaluate mathematical expressions with user-defined variables. However, due to insufficient input validation, an attacker can pass a crafted context object or use MEMBER of the context object into the evaluate() function and trigger arbitrary code execution.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-05
Last Modified
2026-02-10
Generated
2026-05-07
AI Q&A
2025-11-05
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
jorenbroekema javascript_expression_evaluator 3.0.0
silentmatt javascript_expression_evaluator to 2.0.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the expr-eval JavaScript library, which is used to safely evaluate mathematical expressions with user-defined variables. Due to insufficient input validation, an attacker can craft a variables object passed into the evaluate() function that triggers arbitrary code execution.


How can this vulnerability impact me? :

If exploited, this vulnerability allows an attacker to execute arbitrary code within the context of the application using the expr-eval library. This could lead to unauthorized actions, data compromise, or system control depending on the environment where the library is used.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart