CVE-2025-1302
Published: 15 February 2025
Summary
CVE-2025-1302 is a critical-severity Code Injection (CWE-94) vulnerability in Snyk (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 0.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires identifying, prioritizing, and patching flaws like the RCE in vulnerable jsonpath-plus versions prior to 10.3.0.
Mandates validation of information inputs to counter the improper input sanitization enabling code injection via unsafe eval in jsonpath-plus.
Provides vulnerability scanning to identify the presence of the exploitable jsonpath-plus package version in system components or dependencies.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct RCE via unsafe eval in public-facing JS package enables T1190 exploitation and arbitrary JS command execution via T1059.007.
NVD Description
Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode. **Note:** This is…
more
caused by an incomplete fix for [CVE-2024-21534](https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884).
Deeper analysisAI
CVE-2025-1302 is a Remote Code Execution (RCE) vulnerability in versions of the jsonpath-plus npm package prior to 10.3.0, caused by improper input sanitization and the unsafe default usage of eval='safe' mode. This flaw allows attackers to execute arbitrary code on affected systems and is classified under CWE-94 (Code Injection), with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants high confidentiality, integrity, and availability impacts, enabling full arbitrary code execution on the host running the vulnerable jsonpath-plus instance.
Advisories recommend updating to jsonpath-plus version 10.3.0 or later, which includes a fix via commit 30942896d27cb8a806b965a5ca9ef9f686be24ee in the JSONPath-Plus repository. Snyk's vulnerability report (SNYK-JS-JSONPATHPLUS-8719585) confirms this as an incomplete patch for the prior CVE-2024-21534.
Details
- CWE(s)