Skip to main content

Improperly Controlled Modification of Dynamically-Determined Object Attributes

CVE-2026-40897

Severity High
Score 8.8/10

Summary

This security vulnerability allowed executing arbitrary JavaScript via the expression parser of mathjs. You can be affected when you have an application where users can evaluate arbitrary expressions using the mathjs expression parser. This affects versions starting from 13.1.1 prior to 15.2.0.

  • LOW
  • NETWORK
  • HIGH
  • UNCHANGED
  • NONE
  • LOW
  • HIGH
  • HIGH

CWE-915 - Improperly Controlled Modification of Dynamically-Determined Object Attributes

The software receives input from an upstream component that specifies multiple attributes, properties, or fields that are to be initialized or updated in an object, but it does not properly control which attributes can be modified.

References

Advisory Timeline

  • Published