CVE-2024-21534
jsonpath-plus: Remote Code Execution in jsonpath-plus via Improper Input Sanitization
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
4Exploited in Wild
-Decision
Descriptions
All versions of the package jsonpath-plus are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. **Note:** There were several attempts to fix it in versions [10.0.0-10.1.0](https://github.com/JSONPath-Plus/JSONPath/compare/v9.0.0...v10.1.0) but it could still be exploited using [different payloads](https://github.com/JSONPath-Plus/JSONPath/issues/226).
A flaw was found in jsonpath-plus. This vulnerability allows remote code execution via improper input sanitisation and unsafe default usage of the vm module in Node.js. Attackers can exploit this by executing arbitrary code through the unsafe use of the vm module in Node.js, which allows for malicious code injection. This issue occurs due to the way jsonpath-plus evaluates JSON paths using vm, a Node.js module that allows code execution. If user input is not properly sanitized, an attacker can craft JSON paths that execute dangerous commands, such as reading sensitive files.
Versions of the package jsonpath-plus before 10.0.7 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. **Note:** There was an attempt to fix it in version [10.0.0](https://github.com/JSONPath-Plus/JSONPath/commit/6b2f1b4c234292c75912b790bf7e2d7339d4ccd3) but it could still be exploited using [different payloads](https://github.com/JSONPath-Plus/JSONPath/issues/226).
JSONpath-plus versions prior to 10.3.0 are vulnerable to a remote code execution vulnerability due to improper input sanitization. This is due to an incomplete fix for CVE-2024-21534.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2023-12-22 CVE Reserved
- 2024-10-11 CVE Published
- 2024-11-18 CVE Updated
- 2024-11-27 First Exploit
- 2025-06-27 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (10)
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/189440 | 2025-02-26 | |
https://github.com/pabloopez/CVE-2024-21534 | 2024-11-27 | |
https://github.com/XiaomingX/cve-2024-21534-poc | 2024-12-04 | |
https://github.com/verylazytech/cve-2024-21534 | 2024-12-01 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2024-21534 | 2025-05-14 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2317968 | 2025-05-14 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Jsonpath-plus Search vendor "Jsonpath-plus" | Jsonpath Search vendor "Jsonpath-plus" for product "Jsonpath" | * | - |
Affected
|