CVE-2025-13204
BaseFortify
Publication date: 2025-11-14
Last updated on: 2025-11-18
Assigner: CERT/CC
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| silentmatt | expr-eval | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1321 | The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should replace the vulnerable npm package `expr-eval` with the patched version available in the `expr-eval-fork` package.
Can you explain this vulnerability to me?
The vulnerability in the npm package `expr-eval` is a Prototype Pollution issue. This means an attacker who can access the expression evaluation interface can manipulate JavaScript's prototype-based inheritance to execute arbitrary code.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to execute arbitrary code on your system if they have access to the expression evaluation interface, potentially leading to unauthorized actions or system compromise.