Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61140: n/a

0
High
VulnerabilityCVE-2025-61140cvecve-2025-61140
Published: Wed Jan 28 2026 (01/28/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-61140 is a Prototype Pollution vulnerability found in the value function of jsonpath version 1. 1. 1, specifically in the lib/index. js file. Prototype Pollution allows an attacker to manipulate the prototype of base objects, potentially leading to arbitrary code execution, denial of service, or data corruption. Although no known exploits are currently reported in the wild, the vulnerability affects applications that use this jsonpath library version. Exploitation typically requires the attacker to supply crafted input that modifies object prototypes, which can impact the confidentiality, integrity, and availability of affected systems. European organizations using this library in their software stacks, especially in web applications or backend services, could be at risk. Mitigation involves updating to a patched or newer version of jsonpath that addresses this vulnerability or applying code-level sanitization to prevent prototype pollution. Countries with significant software development sectors and high adoption of JavaScript-based technologies, such as Germany, the United Kingdom, France, and the Netherlands, are more likely to be affected.

AI-Powered Analysis

AILast updated: 01/28/2026, 16:20:20 UTC

Technical Analysis

CVE-2025-61140 identifies a Prototype Pollution vulnerability in the jsonpath JavaScript library version 1.1.1, specifically within the value function located in lib/index.js. Prototype Pollution vulnerabilities occur when an attacker can inject or modify properties on JavaScript's Object prototype, thereby influencing all objects that inherit from it. This can lead to unexpected behavior, including arbitrary code execution, privilege escalation, or denial of service. The vulnerability arises because the value function does not properly sanitize or validate input, allowing crafted JSONPath expressions or input data to manipulate the prototype chain. Although no public exploits have been reported, the vulnerability is significant due to the widespread use of jsonpath in parsing and querying JSON data in web applications and backend services. The lack of a CVSS score indicates this is a newly published vulnerability, with the date reserved in late 2025 and publication in early 2026. The absence of patch links suggests that a fix may not yet be available or publicly disclosed. Attackers exploiting this vulnerability do not require authentication or user interaction, increasing the risk profile. The vulnerability impacts confidentiality by potentially exposing sensitive data, integrity by allowing unauthorized data manipulation, and availability by enabling denial of service conditions through prototype manipulation. The scope includes any application or service using the vulnerable jsonpath version, which is common in Node.js environments and JavaScript-based applications.

Potential Impact

For European organizations, the impact of CVE-2025-61140 can be substantial, especially for those relying on JavaScript-based web applications, microservices, or backend systems that incorporate the vulnerable jsonpath library. Prototype Pollution can lead to unauthorized data access, corruption, or application crashes, undermining trust and operational continuity. Sensitive customer or business data could be exposed or altered, leading to compliance violations under GDPR and other data protection regulations. The ease of exploitation without authentication means attackers can remotely target vulnerable systems, increasing the risk of widespread compromise. Additionally, disruption of critical services could affect sectors such as finance, healthcare, and government, which are heavily regulated and targeted by threat actors. The lack of known exploits currently provides a window for proactive mitigation, but the potential for rapid weaponization exists once exploit code becomes available.

Mitigation Recommendations

European organizations should immediately inventory their software dependencies to identify usage of jsonpath version 1.1.1. If possible, upgrade to a patched or newer version of jsonpath that addresses the Prototype Pollution vulnerability once available. In the absence of an official patch, developers should implement input validation and sanitization to reject or neutralize malicious JSONPath expressions that attempt to modify object prototypes. Employ runtime protections such as JavaScript sandboxing or object freezing to limit prototype modifications. Conduct thorough code reviews and static analysis to detect unsafe usage patterns of the value function. Additionally, monitor application logs and network traffic for anomalous JSONPath queries indicative of exploitation attempts. Incorporate this vulnerability into vulnerability management and incident response plans. Finally, engage with vendors or open-source maintainers for updates and advisories related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697a33e64623b1157cd61d86

Added to database: 1/28/2026, 4:05:58 PM

Last enriched: 1/28/2026, 4:20:20 PM

Last updated: 1/28/2026, 5:33:16 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats