We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
All versions of the package jsonpath-plus are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. **Note:** There were several attempts to fix it in versions [10.0.0-10.1.0](https://github.com/JSONPath-Plus/JSONPath/compare/v9.0.0...v10.1.0) but it could still be exploited using [different payloads](https://github.com/JSONPath-Plus/JSONPath/issues/226).
Reserved 2023-12-22 | Published 2024-10-11 | Updated 2024-11-18 | Assigner snykAndrea Angelo Raineri
security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884
security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8185019
github.com/JSONPath-Plus/JSONPath/compare/v9.0.0...v10.1.0
github.com/JSONPath-Plus/JSONPath/issues/226
Support options