Cyber Posture

CVE-2025-1302

CriticalRCE

Published: 15 February 2025

Published
15 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.8993 99.6th percentile
Risk Priority 74 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-1302 is a critical-severity Code Injection (CWE-94) vulnerability in Snyk (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 0.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires identifying, prioritizing, and patching flaws like the RCE in vulnerable jsonpath-plus versions prior to 10.3.0.

prevent

Mandates validation of information inputs to counter the improper input sanitization enabling code injection via unsafe eval in jsonpath-plus.

detect

Provides vulnerability scanning to identify the presence of the exploitable jsonpath-plus package version in system components or dependencies.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Direct RCE via unsafe eval in public-facing JS package enables T1190 exploitation and arbitrary JS command execution via T1059.007.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode. **Note:** This is…

more

caused by an incomplete fix for [CVE-2024-21534](https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884).

Deeper analysisAI

CVE-2025-1302 is a Remote Code Execution (RCE) vulnerability in versions of the jsonpath-plus npm package prior to 10.3.0, caused by improper input sanitization and the unsafe default usage of eval='safe' mode. This flaw allows attackers to execute arbitrary code on affected systems and is classified under CWE-94 (Code Injection), with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants high confidentiality, integrity, and availability impacts, enabling full arbitrary code execution on the host running the vulnerable jsonpath-plus instance.

Advisories recommend updating to jsonpath-plus version 10.3.0 or later, which includes a fix via commit 30942896d27cb8a806b965a5ca9ef9f686be24ee in the JSONPath-Plus repository. Snyk's vulnerability report (SNYK-JS-JSONPATHPLUS-8719585) confirms this as an incomplete patch for the prior CVE-2024-21534.

Details

CWE(s)

Affected Products

Snyk
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-25887Shared CWE-94
CVE-2026-4800Shared CWE-94
CVE-2026-40911Shared CWE-94
CVE-2026-33943Shared CWE-94
CVE-2025-26260Shared CWE-94
CVE-2026-25141Shared CWE-94
CVE-2026-1615Shared CWE-94
CVE-2026-41242Shared CWE-94
CVE-2026-33881Shared CWE-94
CVE-2026-26954Shared CWE-94

References