CVE-2026-1615: All Command Injection — Critical — Patch Now
CVE-2026-1615
Patch jsonpath RCE flaw (CVE-2026-1615) now. Critical vulnerability in jsonpath library before 1.1.2 allows unauthenticated remote code execution via crafted JSON Path expressions. Upgrade to 1.1.2 or later.
Patch now - CVE-2026-1615 is a critical command injection in jsonpath library versions before 1.1.2 that grants unauthenticated attackers remote code execution via unsanitized JSON Path queries. Upgrade immediately to version 1.1.2 to block exploitation.
Overview
A critical security vulnerability has been discovered in the jsonpath package, a popular library used to query and extract data from JSON objects. This flaw allows an attacker to execute arbitrary code on systems using this library.
Vulnerability Explained
In simple terms, the jsonpath library uses an unsafe method to process user-provided search queries (called JSON Path expressions). Because it does not properly check or sanitize this input, an attacker can craft a malicious query that tricks the library into running harmful JavaScript code. This is similar to handing a stranger a set of instructions for your system and having them secretly replace a step with a command to open a backdoor.
Impact and Severity
This vulnerability is rated CRITICAL with a CVSS score of 9.8. Its impact is severe and depends on where the library is used:
- In Node.js/Server Environments: An attacker can achieve full Remote Code Execution (RCE), potentially taking complete control of the affected server, accessing sensitive data, or disrupting services.
- In Web Browsers: If the library is used in front-end code, the flaw can lead to Cross-site Scripting (XSS), allowing attackers to steal user sessions, deface websites, or redirect users to malicious sites.
Any application that uses jsonpath methods like .query(), .value(), or .apply() with untrusted user input is at risk.
Remediation and Mitigation
Immediate action is required to secure affected systems.
-
Primary Fix: Update Immediately. The maintainers of the
jsonpathpackage have released a patched version. Upgrade the package to version 1.1.2 or later. This is the most effective and recommended solution.npm update jsonpath -
Immediate Mitigation (If Update is Not Possible): If you cannot update immediately, you must ensure that no untrusted data is ever passed to any
jsonpathfunction. Review your code to confirm that all JSON Path expressions are hard-coded or come from a trusted, internal source. Treat any user-provided data as inherently unsafe for this library. -
Assessment: Inventory your projects and dependencies to identify all instances where the
jsonpathpackage is used. Use commands likenpm list jsonpathor check yourpackage.jsonfiles.
Summary
This is a severe vulnerability that can lead to complete system compromise. The exploitation is straightforward if user input reaches the vulnerable functions. Prioritize upgrading the jsonpath package to the latest secure version as the most critical defensive action.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-1615?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
Improper Control of Generation of Code ('Code Injection') vulnerability in Themeisle Woody ad snippets insert-php allows Code Injection.This issue affects Woody ad snippets: from n/a through <= 2.7.1....
pdf-image (npm package) through version 2.0.0 allows OS command injection via the pdfFilePath parameter. The constructGetInfoCommand and constructConvertCommandForPage functions use util.format() to i...
ai-scanner is an AI model safety scanner built on NVIDIA garak. From version 1.0.0 to before version 1.4.1, there is a remote code execution vulnerability via JavaScript injection in `BrowserAutomatio...
Postiz is an AI social media scheduling tool. Prior to commit da44801, a "Pwn Request" vulnerability in the Build and Publish PR Docker Image workflow (.github/workflows/pr-docker-build.yml) allows an...