Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48060: CWE-121: Stack-based Buffer Overflow in jqlang jq

0
High
VulnerabilityCVE-2025-48060cvecve-2025-48060cwe-121
Published: Wed May 21 2025 (05/21/2025, 17:32:43 UTC)
Source: CVE
Vendor/Project: jqlang
Product: jq

Description

jq is a command-line JSON processor. In versions up to and including 1.7.1, a heap-buffer-overflow is present in function `jv_string_vfmt` in the jq_fuzz_execute harness from oss-fuzz. This crash happens on file jv.c, line 1456 `void* p = malloc(sz);`. As of time of publication, no patched versions are available.

AI-Powered Analysis

AILast updated: 11/03/2025, 19:40:12 UTC

Technical Analysis

CVE-2025-48060 identifies a stack-based buffer overflow vulnerability classified under CWE-121 in the jq command-line JSON processor, versions up to and including 1.7.1. The vulnerability arises in the function jv_string_vfmt, triggered during fuzz testing via the jq_fuzz_execute harness from oss-fuzz. The flaw manifests as a heap-buffer-overflow at the malloc call on line 1456 of the jv.c source file, where an improperly calculated size (sz) leads to unsafe memory allocation and potential overflow. This memory corruption can be exploited by an attacker supplying crafted JSON input to jq, enabling remote code execution or denial of service without requiring any authentication or user interaction. The CVSS 4.0 base score is 7.7 (high), reflecting network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on availability. No patches or fixes are currently available, and no active exploits have been reported. jq is widely used in automation, data processing, and logging pipelines, making this vulnerability significant for environments processing untrusted JSON data. The absence of a patch necessitates immediate risk mitigation through operational controls and monitoring until a fix is released.

Potential Impact

For European organizations, the impact of CVE-2025-48060 is considerable due to jq's widespread use in software development, DevOps, and data processing workflows. Exploitation could allow attackers to execute arbitrary code, leading to system compromise, data breaches, or service disruption. Critical infrastructure sectors, financial institutions, and technology companies relying on jq for JSON parsing in automated pipelines are particularly vulnerable. The vulnerability's network accessibility and lack of authentication requirements increase the risk of remote exploitation. Disruption of services or data integrity loss could have cascading effects on business operations and regulatory compliance, especially under GDPR and other data protection laws. Additionally, the lack of an available patch prolongs exposure, increasing the window for potential attacks once exploit code becomes public. This elevates the urgency for European entities to implement compensating controls and heightened monitoring to mitigate risk.

Mitigation Recommendations

1. Immediately audit all systems and workflows using jq (version ≤1.7.1) to identify exposure points, especially those processing untrusted JSON input. 2. Restrict jq usage to trusted data sources only, applying strict input validation and sanitization before processing. 3. Employ application-layer firewalls or JSON schema validators upstream to block malformed or suspicious JSON payloads. 4. Monitor jq process behavior and system logs for anomalies indicative of exploitation attempts, such as crashes or unexpected memory errors. 5. Where feasible, isolate jq execution environments using containerization or sandboxing to limit potential damage from exploitation. 6. Engage with the jq development community or vendor for updates and patches; prioritize testing and deploying fixes once available. 7. Consider alternative JSON processing tools with no known vulnerabilities as a temporary workaround. 8. Educate development and operations teams about the vulnerability and safe JSON handling practices. 9. Implement network segmentation to limit exposure of critical systems running vulnerable jq versions. 10. Prepare incident response plans specific to exploitation scenarios involving jq to enable rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-05-15T16:06:40.940Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682e0f74c4522896dcc513dc

Added to database: 5/21/2025, 5:37:56 PM

Last enriched: 11/3/2025, 7:40:12 PM

Last updated: 11/22/2025, 9:31:56 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats