CVE-2025-61140
Published: 28 January 2026
Summary
CVE-2025-61140 is a critical-severity Prototype Pollution (CWE-1321) vulnerability in Dchester Jsonpath. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 21.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Flaw remediation directly addresses the prototype pollution vulnerability by patching or replacing the affected jsonpath 1.1.1 library.
Information input validation prevents crafted JSONPath expressions from exploiting the value function to pollute the Object prototype.
Vulnerability scanning identifies the presence of the vulnerable jsonpath 1.1.1 library in applications processing untrusted input.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Prototype pollution via crafted JSONPath input enables unauthenticated remote exploitation of the library in network-facing applications, directly matching T1190.
NVD Description
The value function in jsonpath 1.1.1 lib/index.js is vulnerable to Prototype Pollution.
Deeper analysisAI
CVE-2025-61140 affects the jsonpath library version 1.1.1, specifically the value function in lib/index.js, where it is vulnerable to prototype pollution (CWE-1321). This flaw enables manipulation of the Object prototype chain through crafted JSONPath expressions. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-01-28T16:16:13.547.
Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low complexity. Exploitation allows pollution of the JavaScript prototype, potentially granting high-impact control over confidentiality, integrity, and availability in affected applications that process untrusted input via the jsonpath library.
Advisories and additional details, including a proof-of-concept, are provided in the GitHub Gist at https://gist.github.com/Dremig/8105c189774217222a8ebea3ed4d341d, with the library repository available at https://github.com/dchester/jsonpath. Practitioners should consult these references for mitigation guidance.
Details
- CWE(s)