CVE-2025-12735

The expr-eval library is a JavaScript expression parser and evaluator designed to safely evaluate mathematical expressions with user-defined variables. However, due to insufficient input validation, an attacker can pass a crafted context object or use MEMBER of the context object into the evaluate() function and trigger arbitrary code execution.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jorenbroekema:javascript_expression_evaluator:3.0.0:*:*:*:*:node.js:*:*
cpe:2.3:a:silentmatt:javascript_expression_evaluator:*:*:*:*:*:node.js:*:*

History

10 Feb 2026, 17:33

Type Values Removed Values Added
References () https://github.com/advisories/GHSA-jc85-fpwf-qm7x - () https://github.com/advisories/GHSA-jc85-fpwf-qm7x - Third Party Advisory
References () https://github.com/jorenbroekema/expr-eval - () https://github.com/jorenbroekema/expr-eval - Product
References () https://github.com/silentmatt/expr-eval - () https://github.com/silentmatt/expr-eval - Product
References () https://github.com/silentmatt/expr-eval/pull/288 - () https://github.com/silentmatt/expr-eval/pull/288 - Issue Tracking, Patch
References () https://kb.cert.org/vuls/id/263614 - () https://kb.cert.org/vuls/id/263614 - Third Party Advisory
References () https://www.npmjs.com/package/expr-eval - () https://www.npmjs.com/package/expr-eval - Product
References () https://www.npmjs.com/package/expr-eval-fork - () https://www.npmjs.com/package/expr-eval-fork - Product
References () https://www.kb.cert.org/vuls/id/263614 - () https://www.kb.cert.org/vuls/id/263614 - Third Party Advisory
References () https://github.com/jorenbroekema/expr-eval/blob/460b820ba01c5aca6c5d84a7d4f1fa5d1913c67b/test/security.js - () https://github.com/jorenbroekema/expr-eval/blob/460b820ba01c5aca6c5d84a7d4f1fa5d1913c67b/test/security.js - Product
First Time Jorenbroekema
Silentmatt
Silentmatt javascript Expression Evaluator
Jorenbroekema javascript Expression Evaluator
CWE CWE-94
CPE cpe:2.3:a:silentmatt:javascript_expression_evaluator:*:*:*:*:*:node.js:*:*
cpe:2.3:a:jorenbroekema:javascript_expression_evaluator:3.0.0:*:*:*:*:node.js:*:*

20 Nov 2025, 16:15

Type Values Removed Values Added
Summary (en) The expr-eval library is a JavaScript expression parser and evaluator designed to safely evaluate mathematical expressions with user-defined variables. However, due to insufficient input validation, an attacker can pass a crafted variables object into the evaluate() function and trigger arbitrary code execution. (en) The expr-eval library is a JavaScript expression parser and evaluator designed to safely evaluate mathematical expressions with user-defined variables. However, due to insufficient input validation, an attacker can pass a crafted context object or use MEMBER of the context object into the evaluate() function and trigger arbitrary code execution.

13 Nov 2025, 15:15

Type Values Removed Values Added
References
  • () https://github.com/advisories/GHSA-jc85-fpwf-qm7x -
  • () https://kb.cert.org/vuls/id/263614 -

10 Nov 2025, 14:15

Type Values Removed Values Added
References
  • () https://github.com/jorenbroekema/expr-eval/blob/460b820ba01c5aca6c5d84a7d4f1fa5d1913c67b/test/security.js -

08 Nov 2025, 01:15

Type Values Removed Values Added
References
  • () https://www.kb.cert.org/vuls/id/263614 -

05 Nov 2025, 19:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

05 Nov 2025, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-05 01:15

Updated : 2026-02-10 17:33


NVD link : CVE-2025-12735

Mitre link : CVE-2025-12735

CVE.ORG link : CVE-2025-12735


JSON object : View

Products Affected

jorenbroekema

  • javascript_expression_evaluator

silentmatt

  • javascript_expression_evaluator
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')