PT-2025-45064 · Pypi · Expr-Eval
Published
2025-11-05
·
Updated
2026-01-09
·
CVE-2025-12735
CVSS v2.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
expr-eval versions prior to 3.0.0
expr-eval-fork versions prior to 3.0.0
Description
The expr-eval library, a JavaScript expression parser and evaluator, is susceptible to remote code execution (RCE). This issue stems from inadequate input validation when processing user-defined variables or context objects passed to the
evaluate() function. An attacker can supply a crafted object to this function, leading to the execution of arbitrary JavaScript code within the application's context. The library is used in over 250 projects, including online calculators, modeling tools, financial applications, and AI/NLP systems. Over 800,000 projects download expr-eval weekly, and over 88,000 download expr-eval-fork weekly. The vulnerability allows an attacker to gain full control over the affected system. The vulnerable component is the Parser.evaluate() function, which does not properly validate the input variables object.Recommendations
Upgrade to expr-eval-fork version 3.0.0 or later.
Upgrade to expr-eval version 3.0.0 or later, if a release including the fix becomes available.
Exploit
Fix
Code Injection
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2025-14089
CVE-2025-12735
GHSA-JC85-FPWF-QM7X
Affected Products
Expr-Eval
References · 38
- 🔥 https://github.com/jorenbroekema/expr-eval/blob/460b820ba01c5aca6c5d84a7d4f1fa5d1913c67b/test/security.js⭐ 3 🔗 1 · Exploit
- https://bdu.fstec.ru/vul/2025-14089 · Security Note
- https://osv.dev/vulnerability/GHSA-jc85-fpwf-qm7x · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-12735 · Security Note
- https://github.com/silentmatt/expr-eval⭐ 1315 🔗 262 · Note
- https://github.com/silentmatt/expr-eval/pull/288⭐ 1295 🔗 257 · Note
- https://github.com/jorenbroekema/expr-eval⭐ 5 🔗 4 · Note
- https://github.com/jorenbroekema/expr-eval/commit/1d71bb2ca8f98df8de00e9cc4de8fdd468a7ad43⭐ 3 🔗 1 · Note
- https://twitter.com/pigram86/status/1993729739781992629 · Twitter Post
- https://twitter.com/knaepp/status/1993731487351312792 · Twitter Post
- https://t.me/cveNotify/142184 · Telegram Post
- https://twitter.com/cracbot/status/1987837682521895206 · Twitter Post
- https://twitter.com/devops_chat/status/1993743373119967570 · Twitter Post
- https://kb.cert.org/vuls/id/263614 · Note
- https://twitter.com/TweetThreatNews/status/1988025880048791606 · Twitter Post