Arbitrary Code Injection Vulnerability in jsonpath Package by JsonPath Library
CVE-2026-1615

9.2CRITICAL

Key Information:

Vendor

JsonPath

Vendor
CVE Published:
9 February 2026

What is CVE-2026-1615?

The jsonpath package is susceptible to Arbitrary Code Injection due to improper handling of user-supplied JSON Path expressions. This vulnerability arises from the library's reliance on the static-eval module, which does not safely manage untrusted data. Attackers can exploit this flaw by crafting malicious JSON Path expressions that, once evaluated, execute arbitrary JavaScript code. This can lead to serious security risks, including Remote Code Execution in Node.js applications and Cross-site Scripting (XSS) in web browser environments. All methods that evaluate JSON Paths, such as .query, .nodes, .paths, .value, .parent, and .apply, are affected.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

jsonpath 0

org.webjars.npm:jsonpath 0

References

CVSS V4

Score:
9.2
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Nick Copi
.