CVE-2025-55346

Published Aug 14, 2025

Last updated 2 months ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-55346 involves an improper control of code generation, specifically a vulnerability in a dynamic Function constructor. User-controlled input flows to an unsafe implementation, which allows network attackers to run arbitrary, unsandboxed JavaScript code within the host's context. This is achieved by sending a simple POST request. The vulnerability allows a remote attacker to execute arbitrary JavaScript code without requiring any user interaction. This can lead to a complete system compromise, unauthorized access to sensitive data, manipulation of application functionality, and potential lateral movement within the network.

Description
User-controlled input flows to an unsafe implementation of a dynamic Function constructor, allowing network attackers to run arbitrary unsandboxed JS code in the context of the host, by sending a simple POST request.
Source
reefs@jfrog.com
NVD status
Awaiting Analysis

Risk scores

CVSS 3.1

Type
Secondary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Weaknesses

reefs@jfrog.com
CWE-94

Social media

Hype score
Not currently trending