CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Critical RCE flaw in expr-eval JavaScript library

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A critical remote code execution (RCE) vulnerability (CVE-2025-12735) in the expr-eval JavaScript library, with over 800,000 weekly downloads, allows attackers to execute code via malicious input. The flaw stems from insufficient validation in the Parser.evaluate() function. The vulnerability affects both the original expr-eval and its fork, expr-eval-fork, impacting over 250 projects. A patch is available in expr-eval-fork v3.0.0, enforcing an allowlist of safe functions and improved test coverage.

Timeline

  1. 10.11.2025 20:32 1 articles · 23h ago

    Critical RCE flaw in expr-eval JavaScript library disclosed

    A critical remote code execution (RCE) vulnerability (CVE-2025-12735) in the expr-eval JavaScript library, with over 800,000 weekly downloads, allows attackers to execute code via malicious input. The flaw stems from insufficient validation in the Parser.evaluate() function. The vulnerability affects both the original expr-eval and its fork, expr-eval-fork, impacting over 250 projects. A patch is available in expr-eval-fork v3.0.0, enforcing an allowlist of safe functions and improved test coverage.

    Show sources

Information Snippets