Improperly Controlled Modification of Dynamically-Determined Object Attributes in mathjs
CVE-2026-41139
- mathjs
- org.webjars:mathjs
Summary
Two security vulnerabilities were detected in mathjs versions 13.1.0 prior to 15.2.0, which allowed execution of arbitrary JavaScript via the mathjs expression parser. Applications are affected if they allow users to evaluate untrusted or arbitrary expressions using the mathjs expression parser, as these flaws enable sandbox bypass and code execution.
- LOW
- NETWORK
- HIGH
- UNCHANGED
- NONE
- LOW
- HIGH
- HIGH
CWE-915 - Improperly Controlled Modification of Dynamically-Determined Object Attributes
The software receives input from an upstream component that specifies multiple attributes, properties, or fields that are to be initialized or updated in an object, but it does not properly control which attributes can be modified.
References
Advisory Timeline
- Published