CVE-2025-1302

9.8 CRITICAL

📋 TL;DR

CVE-2025-1302 is a critical Remote Code Execution vulnerability in jsonpath-plus versions before 10.3.0. Attackers can execute arbitrary code on affected systems by exploiting improper input sanitization in the 'safe' eval mode. This affects any application using vulnerable versions of the jsonpath-plus package.

💻 Affected Systems

Products:
  • jsonpath-plus
Versions: All versions before 10.3.0
Operating Systems: All operating systems running Node.js
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default 'safe' eval mode. This is an incomplete fix for CVE-2024-21534.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary commands, steal data, install malware, or pivot to other systems.

🟠

Likely Case

Application compromise leading to data theft, service disruption, or lateral movement within the environment.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege, and input validation are implemented.

🌐 Internet-Facing: HIGH - Web applications processing untrusted JSON input are directly exploitable from the internet.
🏢 Internal Only: MEDIUM - Internal applications processing JSON from untrusted sources remain vulnerable to insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept available in GitHub gist. Exploitation requires the application to process attacker-controlled JSON input.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.3.0

Vendor Advisory: https://github.com/JSONPath-Plus/JSONPath/commit/30942896d27cb8a806b965a5ca9ef9f686be24ee

Restart Required: Yes

Instructions:

1. Update jsonpath-plus to version 10.3.0 or later using npm update jsonpath-plus. 2. Restart all Node.js applications using the package. 3. Test functionality after update.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation and sanitization for all JSON inputs before processing with jsonpath-plus.

Network Controls

all

Restrict network access to applications using jsonpath-plus and implement WAF rules to block suspicious JSON payloads.

🧯 If You Can't Patch

  • Isolate affected applications in network segments with strict egress filtering
  • Implement application-level allowlisting for JSON input sources and monitor for anomalous patterns

🔍 How to Verify

Check if Vulnerable:

Check package.json or run npm list jsonpath-plus to see installed version. If version is below 10.3.0, system is vulnerable.

Check Version:

npm list jsonpath-plus | grep jsonpath-plus

Verify Fix Applied:

After update, verify npm list jsonpath-plus shows version 10.3.0 or higher and test application functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process spawns from Node.js applications
  • Errors in application logs related to JSON parsing failures
  • Unexpected outbound network connections from application servers

Network Indicators:

  • HTTP requests containing unusual JSON payloads with JavaScript-like syntax
  • Traffic to known malicious domains from application servers

SIEM Query:

source="application.logs" AND ("jsonpath-plus" OR "JSONPath") AND ("eval" OR "script" OR "exec")

🔗 References

📤 Share & Export