All versions of the package jsonpath are vulnerable to Arbitrary Code Injection via unsafe evaluation of user-supplied JSON Path expressions. The library relies on the static-eval module to process JSON Path input, which is not designed to handle untrusted data safely. An attacker can exploit this vulnerability by supplying a malicious JSON Path expression that, when evaluated, executes arbitrary JavaScript code, leading to Remote Code Execution in Node.js environments or Cross-site Scripting (XSS) in browser contexts. This affects all methods that evaluate JSON Paths against objects, including .query, .nodes, .paths, .value, .parent, and .apply.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-87r5-mp6g-5w5j jsonpath has Arbitrary Code Injection via Unsafe Evaluation of JSON Path Expressions
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 10 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
Title jsonpath: jsonpath: Arbitrary Code Execution via unsafe JSON Path expression evaluation
References
Metrics threat_severity

None

threat_severity

Critical


Mon, 09 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Dchester
Dchester jsonpath
Vendors & Products Dchester
Dchester jsonpath

Mon, 09 Feb 2026 05:15:00 +0000

Type Values Removed Values Added
Description All versions of the package jsonpath are vulnerable to Arbitrary Code Injection via unsafe evaluation of user-supplied JSON Path expressions. The library relies on the static-eval module to process JSON Path input, which is not designed to handle untrusted data safely. An attacker can exploit this vulnerability by supplying a malicious JSON Path expression that, when evaluated, executes arbitrary JavaScript code, leading to Remote Code Execution in Node.js environments or Cross-site Scripting (XSS) in browser contexts. This affects all methods that evaluate JSON Paths against objects, including .query, .nodes, .paths, .value, .parent, and .apply.
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P'}

cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2026-02-09T16:07:32.556Z

Reserved: 2026-01-29T13:07:32.703Z

Link: CVE-2026-1615

cve-icon Vulnrichment

Updated: 2026-02-09T16:07:29.695Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-09T05:16:24.353

Modified: 2026-02-09T16:08:35.290

Link: CVE-2026-1615

cve-icon Redhat

Severity : Critical

Publid Date: 2026-02-09T05:00:09Z

Links: CVE-2026-1615 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-02-09T10:39:26Z

Weaknesses