PT-2025-45064 · Pypi · Expr-Eval

Published

2025-11-05

·

Updated

2026-01-09

·

CVE-2025-12735

CVSS v2.0
10
VectorAV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions expr-eval versions prior to 3.0.0 expr-eval-fork versions prior to 3.0.0
Description The expr-eval library, a JavaScript expression parser and evaluator, is susceptible to remote code execution (RCE). This issue stems from inadequate input validation when processing user-defined variables or context objects passed to the
evaluate()
function. An attacker can supply a crafted object to this function, leading to the execution of arbitrary JavaScript code within the application's context. The library is used in over 250 projects, including online calculators, modeling tools, financial applications, and AI/NLP systems. Over 800,000 projects download expr-eval weekly, and over 88,000 download expr-eval-fork weekly. The vulnerability allows an attacker to gain full control over the affected system. The vulnerable component is the
Parser.evaluate()
function, which does not properly validate the input
variables
object.
Recommendations Upgrade to expr-eval-fork version 3.0.0 or later. Upgrade to expr-eval version 3.0.0 or later, if a release including the fix becomes available.

Exploit

Fix

Code Injection

RCE

Weakness Enumeration

Related Identifiers

BDU:2025-14089
CVE-2025-12735
GHSA-JC85-FPWF-QM7X

Affected Products

Expr-Eval