CVE-2025-48060: CWE-121: Stack-based Buffer Overflow in jqlang jq
jq is a command-line JSON processor. In versions up to and including 1.7.1, a heap-buffer-overflow is present in function `jv_string_vfmt` in the jq_fuzz_execute harness from oss-fuzz. This crash happens on file jv.c, line 1456 `void* p = malloc(sz);`. As of time of publication, no patched versions are available.
AI Analysis
Technical Summary
CVE-2025-48060 identifies a stack-based buffer overflow vulnerability classified under CWE-121 in the jq command-line JSON processor, versions up to and including 1.7.1. The vulnerability arises in the function jv_string_vfmt, triggered during fuzz testing via the jq_fuzz_execute harness from oss-fuzz. The flaw manifests as a heap-buffer-overflow at the malloc call on line 1456 of the jv.c source file, where an improperly calculated size (sz) leads to unsafe memory allocation and potential overflow. This memory corruption can be exploited by an attacker supplying crafted JSON input to jq, enabling remote code execution or denial of service without requiring any authentication or user interaction. The CVSS 4.0 base score is 7.7 (high), reflecting network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on availability. No patches or fixes are currently available, and no active exploits have been reported. jq is widely used in automation, data processing, and logging pipelines, making this vulnerability significant for environments processing untrusted JSON data. The absence of a patch necessitates immediate risk mitigation through operational controls and monitoring until a fix is released.
Potential Impact
For European organizations, the impact of CVE-2025-48060 is considerable due to jq's widespread use in software development, DevOps, and data processing workflows. Exploitation could allow attackers to execute arbitrary code, leading to system compromise, data breaches, or service disruption. Critical infrastructure sectors, financial institutions, and technology companies relying on jq for JSON parsing in automated pipelines are particularly vulnerable. The vulnerability's network accessibility and lack of authentication requirements increase the risk of remote exploitation. Disruption of services or data integrity loss could have cascading effects on business operations and regulatory compliance, especially under GDPR and other data protection laws. Additionally, the lack of an available patch prolongs exposure, increasing the window for potential attacks once exploit code becomes public. This elevates the urgency for European entities to implement compensating controls and heightened monitoring to mitigate risk.
Mitigation Recommendations
1. Immediately audit all systems and workflows using jq (version ≤1.7.1) to identify exposure points, especially those processing untrusted JSON input. 2. Restrict jq usage to trusted data sources only, applying strict input validation and sanitization before processing. 3. Employ application-layer firewalls or JSON schema validators upstream to block malformed or suspicious JSON payloads. 4. Monitor jq process behavior and system logs for anomalies indicative of exploitation attempts, such as crashes or unexpected memory errors. 5. Where feasible, isolate jq execution environments using containerization or sandboxing to limit potential damage from exploitation. 6. Engage with the jq development community or vendor for updates and patches; prioritize testing and deploying fixes once available. 7. Consider alternative JSON processing tools with no known vulnerabilities as a temporary workaround. 8. Educate development and operations teams about the vulnerability and safe JSON handling practices. 9. Implement network segmentation to limit exposure of critical systems running vulnerable jq versions. 10. Prepare incident response plans specific to exploitation scenarios involving jq to enable rapid containment and remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-48060: CWE-121: Stack-based Buffer Overflow in jqlang jq
Description
jq is a command-line JSON processor. In versions up to and including 1.7.1, a heap-buffer-overflow is present in function `jv_string_vfmt` in the jq_fuzz_execute harness from oss-fuzz. This crash happens on file jv.c, line 1456 `void* p = malloc(sz);`. As of time of publication, no patched versions are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-48060 identifies a stack-based buffer overflow vulnerability classified under CWE-121 in the jq command-line JSON processor, versions up to and including 1.7.1. The vulnerability arises in the function jv_string_vfmt, triggered during fuzz testing via the jq_fuzz_execute harness from oss-fuzz. The flaw manifests as a heap-buffer-overflow at the malloc call on line 1456 of the jv.c source file, where an improperly calculated size (sz) leads to unsafe memory allocation and potential overflow. This memory corruption can be exploited by an attacker supplying crafted JSON input to jq, enabling remote code execution or denial of service without requiring any authentication or user interaction. The CVSS 4.0 base score is 7.7 (high), reflecting network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on availability. No patches or fixes are currently available, and no active exploits have been reported. jq is widely used in automation, data processing, and logging pipelines, making this vulnerability significant for environments processing untrusted JSON data. The absence of a patch necessitates immediate risk mitigation through operational controls and monitoring until a fix is released.
Potential Impact
For European organizations, the impact of CVE-2025-48060 is considerable due to jq's widespread use in software development, DevOps, and data processing workflows. Exploitation could allow attackers to execute arbitrary code, leading to system compromise, data breaches, or service disruption. Critical infrastructure sectors, financial institutions, and technology companies relying on jq for JSON parsing in automated pipelines are particularly vulnerable. The vulnerability's network accessibility and lack of authentication requirements increase the risk of remote exploitation. Disruption of services or data integrity loss could have cascading effects on business operations and regulatory compliance, especially under GDPR and other data protection laws. Additionally, the lack of an available patch prolongs exposure, increasing the window for potential attacks once exploit code becomes public. This elevates the urgency for European entities to implement compensating controls and heightened monitoring to mitigate risk.
Mitigation Recommendations
1. Immediately audit all systems and workflows using jq (version ≤1.7.1) to identify exposure points, especially those processing untrusted JSON input. 2. Restrict jq usage to trusted data sources only, applying strict input validation and sanitization before processing. 3. Employ application-layer firewalls or JSON schema validators upstream to block malformed or suspicious JSON payloads. 4. Monitor jq process behavior and system logs for anomalies indicative of exploitation attempts, such as crashes or unexpected memory errors. 5. Where feasible, isolate jq execution environments using containerization or sandboxing to limit potential damage from exploitation. 6. Engage with the jq development community or vendor for updates and patches; prioritize testing and deploying fixes once available. 7. Consider alternative JSON processing tools with no known vulnerabilities as a temporary workaround. 8. Educate development and operations teams about the vulnerability and safe JSON handling practices. 9. Implement network segmentation to limit exposure of critical systems running vulnerable jq versions. 10. Prepare incident response plans specific to exploitation scenarios involving jq to enable rapid containment and remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-05-15T16:06:40.940Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682e0f74c4522896dcc513dc
Added to database: 5/21/2025, 5:37:56 PM
Last enriched: 11/3/2025, 7:40:12 PM
Last updated: 11/22/2025, 9:31:56 AM
Views: 82
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13318: CWE-862 Missing Authorization in codepeople Booking Calendar Contact Form
MediumCVE-2025-13136: CWE-862 Missing Authorization in westerndeal GSheetConnector For Ninja Forms
MediumCVE-2025-13384: CWE-862 Missing Authorization in codepeople CP Contact Form with PayPal
HighCVE-2025-13317: CWE-862 Missing Authorization in codepeople Appointment Booking Calendar
MediumCVE-2025-12877: CWE-862 Missing Authorization in themeatelier IDonate – Blood Donation, Request And Donor Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.