CVE-2019-10788
JavaScript vulnerability analysis and mitigation

Overview

im-metadata through version 3.0.1 is affected by a command injection vulnerability identified as CVE-2019-10788. The vulnerability was discovered and disclosed on February 4, 2020. The package, which is used to retrieve image metadata as a JSON object using ImageMagick's identify command, allows remote attackers to execute arbitrary commands via the 'exec' argument (NVD).

Technical details

The vulnerability exists because the package fails to properly validate input before processing it through the exec function. It is possible to inject arbitrary commands as part of the metadata options which are passed to the exec function. The vulnerability has been assigned a CVSS score of 9.8 (Critical) by NVD and 7.5 (High) by Snyk, indicating its severe nature (Snyk).

Impact

If exploited, this vulnerability can lead to arbitrary command execution on the affected system. An attacker can execute malicious commands with the privileges of the application running the vulnerable package. The vulnerability requires no special privileges or user interaction to exploit, making it particularly dangerous (Snyk).

Mitigation and workarounds

A fix has been implemented in the master branch of the repository that includes input validation to check for suspicious characters before processing. The fix includes a regular expression check that validates the path argument against potentially malicious characters such as ;, &, `, $, (), ||, |, !, >, <, ?, and ${. However, this fix has not yet been published as a new version (GitHub Commit).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22610HIGH8.5
  • JavaScriptJavaScript
  • angular.js
NoYesJan 10, 2026
CVE-2026-22595HIGH8.1
  • JavaScriptJavaScript
  • ghost
NoYesJan 10, 2026
CVE-2026-22594HIGH8.1
  • JavaScriptJavaScript
  • ghost
NoYesJan 10, 2026
CVE-2026-22596MEDIUM6.7
  • JavaScriptJavaScript
  • ghost
NoYesJan 10, 2026
CVE-2026-22597LOW2
  • JavaScriptJavaScript
  • ghost
NoYesJan 10, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management