Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestions search

With package: python313Packages.jsonpath-rw

Found 1 matching suggestions

View:
Compact
Detailed
Untriaged
Permalink CVE-2026-1615
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 2 months, 1 week ago Activity log
  • Created suggestion
All versions of the package jsonpath are vulnerable to Arbitrary …

All versions of the package jsonpath are vulnerable to Arbitrary Code Injection via unsafe evaluation of user-supplied JSON Path expressions. The library relies on the static-eval module to process JSON Path input, which is not designed to handle untrusted data safely. An attacker can exploit this vulnerability by supplying a malicious JSON Path expression that, when evaluated, executes arbitrary JavaScript code, leading to Remote Code Execution in Node.js environments or Cross-site Scripting (XSS) in browser contexts. This affects all methods that evaluate JSON Paths against objects, including .query, .nodes, .paths, .value, .parent, and .apply.

Affected products

jsonpath
  • *
  • <1.2.0
org.webjars.npm:jsonpath
  • *
  • <1.2.0

Matching in nixpkgs

pkgs.typstPackages.jsonpath_0_1_0

jsonpath extracts values from dictionary or array using a JSONPath expression as per RFC 9535, except the filter syntax is different

pkgs.python314Packages.jsonpath-rw

Robust and significantly extended implementation of JSONPath for Python, with a clear AST for metaprogramming

  • nixos-unstable -
    • nixpkgs-unstable 1.4.0
    • nixos-unstable-small 1.4.0

Package maintainers