Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jc85-fpwf-qm7x | expr-eval does not restrict functions passed to the evaluate function |
Tue, 10 Feb 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jorenbroekema
Jorenbroekema javascript Expression Evaluator Silentmatt Silentmatt javascript Expression Evaluator |
|
| Weaknesses | CWE-94 | |
| CPEs | cpe:2.3:a:jorenbroekema:javascript_expression_evaluator:3.0.0:*:*:*:*:node.js:*:* cpe:2.3:a:silentmatt:javascript_expression_evaluator:*:*:*:*:*:node.js:*:* |
|
| Vendors & Products |
Jorenbroekema
Jorenbroekema javascript Expression Evaluator Silentmatt Silentmatt javascript Expression Evaluator |
Thu, 20 Nov 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The expr-eval library is a JavaScript expression parser and evaluator designed to safely evaluate mathematical expressions with user-defined variables. However, due to insufficient input validation, an attacker can pass a crafted variables object into the evaluate() function and trigger arbitrary code execution. | The expr-eval library is a JavaScript expression parser and evaluator designed to safely evaluate mathematical expressions with user-defined variables. However, due to insufficient input validation, an attacker can pass a crafted context object or use MEMBER of the context object into the evaluate() function and trigger arbitrary code execution. |
Thu, 13 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 13 Nov 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-917 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 10 Nov 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
ssvc
|
Sat, 08 Nov 2025 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 05 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 05 Nov 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Expr-eval Project
Expr-eval Project expr-eval |
|
| Vendors & Products |
Expr-eval Project
Expr-eval Project expr-eval |
Wed, 05 Nov 2025 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The expr-eval library is a JavaScript expression parser and evaluator designed to safely evaluate mathematical expressions with user-defined variables. However, due to insufficient input validation, an attacker can pass a crafted variables object into the evaluate() function and trigger arbitrary code execution. | |
| Title | CVE-2025-12735 | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2025-11-22T23:45:45.512Z
Reserved: 2025-11-05T00:04:49.648Z
Link: CVE-2025-12735
Updated: 2025-11-08T00:11:55.078Z
Status : Analyzed
Published: 2025-11-05T01:15:33.313
Modified: 2026-02-10T17:33:24.527
Link: CVE-2025-12735
OpenCVE Enrichment
Updated: 2025-11-05T10:47:04Z
Github GHSA