More

    An incredibly popular JavaScript library might have some worrying malware issues



    • CVE-2025-12735 in expr-eval allows remote code execution via unsafe input evaluation
    • Vulnerable versions ≤2.0.2; patched in 2.0.3 and forked in expr-eval-fork 3.0.0
    • Developers should sanitize variables and avoid untrusted input in evaluate() calls

    A widely-adopted JavaScript library has been found carrying a critical vulnerability which could allow threat actors to execute malicious code, remotely.

    Security researcher Jangwoo Choe discovered an “insufficient input validation” bug in expr-eval, a library with more than 800,000 weekly downloads on NPM. It parses and evaluates mathematical expressions from strings, and allows developers to safely compute user-entered formulas. Generally, the script is used in web apps for calculators, data analysis tools, and expression-based logic.


    https://cdn.mos.cms.futurecdn.net/VyYgfUHgbvAsTDDYewj2Am-970-80.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    Leave a reply

    Please enter your comment!
    Please enter your name here

    spot_imgspot_img