Description
All versions of the package jsonpath are vulnerable to Arbitrary Code Injection via unsafe evaluation of user-supplied JSON Path expressions. The library relies on the static-eval module to process JSON Path input, which is not designed to handle untrusted data safely. An attacker can exploit this vulnerability by supplying a malicious JSON Path expression that, when evaluated, executes arbitrary JavaScript code, leading to Remote Code Execution in Node.js environments or Cross-site Scripting (XSS) in browser contexts. This affects all methods that evaluate JSON Paths against objects, including .query, .nodes, .paths, .value, .parent, and .apply.
INFO
Published Date :
2026-02-09T05:00:09.050Z
Last Modified :
2026-02-09T16:07:32.556Z
Source :
snyk
AFFECTED PRODUCTS
The following products are affected by CVE-2026-1615 vulnerability.
| Vendors | Products |
|---|---|
| Dchester |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-1615.