CVE-2026-1615

9.8 CRITICAL

📋 TL;DR

The jsonpath package is vulnerable to arbitrary code execution via malicious JSON Path expressions. Attackers can inject JavaScript code that gets executed during JSON Path evaluation, leading to remote code execution in Node.js or XSS in browsers. All applications using jsonpath to process untrusted JSON Path expressions are affected.

💻 Affected Systems

Products:
  • jsonpath npm package
Versions: All versions
Operating Systems: All platforms running Node.js
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable when processing user-supplied JSON Path expressions against objects using .query, .nodes, .paths, .value, .parent, or .apply methods.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full remote code execution on Node.js servers, allowing complete system compromise, data theft, and lateral movement within the network.

🟠

Likely Case

Server-side JavaScript execution leading to data exfiltration, privilege escalation, or denial of service in Node.js applications.

🟢

If Mitigated

Limited impact if only trusted JSON Path expressions are processed or if input validation blocks malicious patterns.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user input to reach vulnerable JSON Path evaluation functions. The vulnerability is well-documented with public proof-of-concept examples.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None

Vendor Advisory: https://github.com/dchester/jsonpath/security/advisories

Restart Required: No

Instructions:

1. Remove jsonpath dependency from package.json
2. Run npm uninstall jsonpath
3. Replace with alternative JSON Path libraries like jsonpath-plus or implement custom validation
4. Update all code imports from jsonpath to new library

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict validation of JSON Path expressions before passing to jsonpath functions

Use Alternative Library

all

Replace jsonpath with jsonpath-plus which doesn't use static-eval

npm uninstall jsonpath
npm install jsonpath-plus

🧯 If You Can't Patch

  • Implement strict input validation to only allow known-safe JSON Path patterns
  • Isolate jsonpath usage in sandboxed environments or containers with minimal privileges

🔍 How to Verify

Check if Vulnerable:

Check package.json for jsonpath dependency: grep -r 'jsonpath' package.json

Check Version:

npm list jsonpath

Verify Fix Applied:

Verify jsonpath is removed from package.json and node_modules, and alternative library is installed

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript execution errors
  • Suspicious JSON Path patterns in input logs
  • Unexpected process spawns from Node.js applications

Network Indicators:

  • Outbound connections from Node.js processes to unexpected destinations
  • Large data exfiltration from application servers

SIEM Query:

source="application.logs" AND ("jsonpath" OR "static-eval") AND ("eval" OR "Function" OR "constructor")

🔗 References

📤 Share & Export