{"id":"CVE-2025-13204","details":"npm package `expr-eval` is vulnerable to Prototype Pollution. An attacker with access to express eval interface can use JavaScript prototype-based inheritance model to achieve arbitrary code execution. The npm expr-eval-fork package resolves this issue.","aliases":["GHSA-8gw3-rxh4-v6jx"],"modified":"2026-05-04T08:46:57.152551Z","published":"2025-11-14T17:16:01.603Z","withdrawn":"2026-05-04T08:46:57.152551Z","related":["CGA-94m4-xrmp-9h6f"],"references":[{"type":"WEB","url":"https://github.com/SECCON/SECCON2022_final_CTF/blob/main/jeopardy/web/babybox/solver/solver.py"},{"type":"WEB","url":"https://github.com/vladko312/extras/blob/f549d505af300fd74a01b46fab2102990ff1c14d/expr-eval.py"},{"type":"WEB","url":"https://www.npmjs.com/package/expr-eval-fork"},{"type":"FIX","url":"https://github.com/silentmatt/expr-eval/pull/252/files"},{"type":"PACKAGE","url":"https://github.com/jorenbroekema/expr-eval"},{"type":"PACKAGE","url":"https://github.com/silentmatt/expr-eval"},{"type":"EVIDENCE","url":"https://www.huntr.dev/bounties/1-npm-expr-eval/"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-13204.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}]}