CVE-2025-12735
BaseFortify
Publication date: 2025-11-05
Last updated on: 2026-02-10
Assigner: CERT/CC
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| jorenbroekema | javascript_expression_evaluator | 3.0.0 |
| silentmatt | javascript_expression_evaluator | to 2.0.2 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the expr-eval JavaScript library, which is used to safely evaluate mathematical expressions with user-defined variables. Due to insufficient input validation, an attacker can craft a variables object passed into the evaluate() function that triggers arbitrary code execution.
How can this vulnerability impact me? :
If exploited, this vulnerability allows an attacker to execute arbitrary code within the context of the application using the expr-eval library. This could lead to unauthorized actions, data compromise, or system control depending on the environment where the library is used.