Skip to main content

Improperly Controlled Modification of Dynamically-Determined Object Attributes in mathjs

CVE-2026-41139

  • mathjs
  • org.webjars:mathjs
Severity High
Score 8.8/10

Summary

Two security vulnerabilities were detected in mathjs versions 13.1.0 prior to 15.2.0, which allowed execution of arbitrary JavaScript via the mathjs expression parser. Applications are affected if they allow users to evaluate untrusted or arbitrary expressions using the mathjs expression parser, as these flaws enable sandbox bypass and code execution.

  • LOW
  • NETWORK
  • HIGH
  • UNCHANGED
  • NONE
  • LOW
  • HIGH
  • HIGH

CWE-915 - Improperly Controlled Modification of Dynamically-Determined Object Attributes

The software receives input from an upstream component that specifies multiple attributes, properties, or fields that are to be initialized or updated in an object, but it does not properly control which attributes can be modified.

Advisory Timeline

  • Published