#VU121009 Prototype pollution in expr-eval and expr-eval-fork - CVE-2025-13204
Published: January 7, 2026
Vulnerability identifier: #VU121009
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2025-13204
CWE-ID: CWE-1321
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
expr-eval
expr-eval-fork
expr-eval
expr-eval-fork
Software vendor:
Silent Matt
Joren Broekema
Silent Matt
Joren Broekema
Description
The vulnerability allows a remote attacker to execute arbitrary JavaScript code.
The vulnerability exists due to improper input validation. A remote attacker can pass specially crafted input to the application and perform prototype pollution, which can result in information disclosure or data manipulation.
Remediation
The vulnerability is resolved in expr-eval-fork library.
External links
- https://github.com/SECCON/SECCON2022_final_CTF/blob/main/jeopardy/web/babybox/solver/solver.py
- https://github.com/silentmatt/expr-eval/pull/252/files
- https://github.com/vladko312/extras/blob/f549d505af300fd74a01b46fab2102990ff1c14d/expr-eval.py
- https://www.huntr.dev/bounties/1-npm-expr-eval/
- https://github.com/silentmatt/expr-eval/issues/266