PT-2025-45064 · Pypi · Expr-Eval
Published
2025-11-05
·
Updated
2025-12-08
·
CVE-2025-12735
CVSS v2.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
expr-eval versions prior to 3.0.0
expr-eval-fork versions prior to 3.0.0
Description
The expr-eval library, a JavaScript expression parser and evaluator, has a flaw due to inadequate input validation. An attacker can provide a specially crafted variables object to the
evaluate() function, potentially leading to arbitrary code execution. This issue affects over 250 projects, including those in the areas of AI and Natural Language Processing (NLP), which utilize the library for evaluating mathematical expressions from user input. The vulnerability allows an attacker to gain full control over the affected system or fully disclose information. The issue stems from the library's failure to validate the variables/context object passed to the Parser.evaluate() function, enabling the execution of malicious function objects by the parser during evaluation. More than 800,000 projects download this library weekly.Recommendations
For expr-eval versions prior to 3.0.0, upgrade to version 3.0.0 or later.
For expr-eval-fork versions prior to 3.0.0, upgrade to version 3.0.0 or later.
Exploit
Fix
Code Injection
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2025-14089
CVE-2025-12735
GHSA-JC85-FPWF-QM7X
Affected Products
Expr-Eval
References · 34
- 🔥 https://github.com/jorenbroekema/expr-eval/blob/460b820ba01c5aca6c5d84a7d4f1fa5d1913c67b/test/security.js⭐ 3 🔗 1 · Exploit
- https://bdu.fstec.ru/vul/2025-14089 · Security Note
- https://osv.dev/vulnerability/GHSA-jc85-fpwf-qm7x · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-12735 · Security Note
- https://github.com/silentmatt/expr-eval⭐ 1303 🔗 261 · Note
- https://github.com/silentmatt/expr-eval/pull/288⭐ 1295 🔗 257 · Note
- https://github.com/jorenbroekema/expr-eval⭐ 5 🔗 2 · Note
- https://github.com/jorenbroekema/expr-eval/commit/1d71bb2ca8f98df8de00e9cc4de8fdd468a7ad43⭐ 3 🔗 1 · Note
- https://twitter.com/rgonv/status/1998161819911987298 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1988025880048791606 · Twitter Post
- https://t.me/cveNotify/142262 · Telegram Post
- https://twitter.com/pigram86/status/1993729739781992629 · Twitter Post
- https://kb.cert.org/vuls/id/263614 · Note
- https://reddit.com/r/VulnMatter/comments/1oq8naq/resumen_diario_de_vulnerabilidades_06112025 · Reddit Post
- https://twitter.com/dailytechonx/status/1988307001336647880 · Twitter Post