CVE-2026-1615
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2026-02-09

Last updated on: 2026-04-29

Assigner: Snyk

Description
Versions of the package jsonpath before 1.3.0 are vulnerable to Arbitrary Code Injection via unsafe evaluation of user-supplied JSON Path expressions. The library relies on the static-eval module to process JSON Path input, which is not designed to handle untrusted data safely. An attacker can exploit this vulnerability by supplying a malicious JSON Path expression that, when evaluated, executes arbitrary JavaScript code, leading to Remote Code Execution in Node.js environments or Cross-site Scripting (XSS) in browser contexts. This affects all methods that evaluate JSON Paths against objects, including .query, .nodes, .paths, .value, .parent, and .apply.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-09
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-02-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-1615 is an Arbitrary Code Injection vulnerability affecting the jsonpath package, which is used to query JavaScript objects with JSONPath expressions in Node.js environments.

The vulnerability arises because the package relies on the static-eval module to process JSONPath input, which is not designed to safely handle untrusted data.

An attacker can exploit this by supplying a malicious JSONPath expression that, when evaluated, executes arbitrary JavaScript code.

This can lead to Remote Code Execution (RCE) in Node.js environments or Cross-site Scripting (XSS) attacks in browser contexts.

All methods that evaluate JSONPath expressions against objects, including .query, .nodes, .paths, .value, .parent, and .apply, are affected.


How can this vulnerability impact me? :

This vulnerability can have severe impacts including Remote Code Execution (RCE) in Node.js environments, allowing attackers to execute arbitrary code on the affected system.

In browser contexts, it can lead to Cross-site Scripting (XSS) attacks, which can compromise user data and session integrity.

The vulnerability affects confidentiality, integrity, and availability of the affected systems, posing a high security risk.

The attack can be performed remotely over the network without requiring any privileges or user interaction, making it easier for attackers to exploit.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability affects all versions of the jsonpath package used in Node.js environments. Detection involves analyzing your applications and dependencies to identify if the vulnerable jsonpath package is in use.'}, {'type': 'paragraph', 'content': "You can detect the presence of the vulnerable package by checking your project's dependencies. For example, in a Node.js project, you can run the following command to see if jsonpath is installed:"}, {'type': 'list_item', 'content': 'npm ls jsonpath'}, {'type': 'paragraph', 'content': 'If jsonpath appears in the dependency tree, it indicates potential exposure to this vulnerability.'}, {'type': 'paragraph', 'content': 'Additionally, you can search your codebase for usage of jsonpath methods that evaluate JSONPath expressions, such as `.query`, `.nodes`, `.paths`, `.value`, `.parent`, and `.apply`, since these are the vulnerable points.'}, {'type': 'paragraph', 'content': 'There are no specific network detection commands provided, but monitoring for suspicious JSONPath expressions or unexpected JavaScript code execution in logs or runtime behavior may help identify exploitation attempts.'}] [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Since there is currently no fixed version of the jsonpath package addressing this vulnerability, immediate mitigation steps focus on reducing exposure and risk.

  • Avoid evaluating untrusted or user-supplied JSONPath expressions in your applications.
  • Implement input validation and sanitization to prevent malicious JSONPath expressions from being processed.
  • Review and restrict access to APIs or interfaces that accept JSONPath input to trusted users or systems only.
  • Monitor application logs and runtime behavior for signs of arbitrary code execution or unusual activity.

Consider using security tools like Snyk to analyze your applications for usage of the vulnerable package and follow their recommended mitigations.

Plan to update or replace the jsonpath package once a fixed version becomes available.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart