CVE-2025-49014
jq vulnerability analysis and mitigation

Overview

CVE-2025-49014 affects jq, a command-line JSON processor. The vulnerability was discovered in version 1.8.0, where a heap use after free vulnerability exists within the function f_strflocaltime of /src/builtin.c. The issue was identified and disclosed on June 18, 2025, and has been patched in commit 499c91b, though no official fixed version has been released at the time of publication (GitHub Advisory).

Technical details

The vulnerability is classified as a heap use-after-free issue in the f_strflocaltime function within the src/builtin.c file. The CVSS 4.0 score is 5.5 (Medium), with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P. The issue occurs when handling empty string inputs in the strflocaltime function, leading to potential memory corruption (NVD).

Impact

The vulnerability allows for heap memory access after it has been freed, which could potentially lead to program crashes or memory corruption. The severity is rated as Medium, indicating that while the vulnerability presents a security risk, its impact is somewhat limited (GitHub Advisory).

Mitigation and workarounds

A patch has been developed and committed (commit 499c91b) that addresses the vulnerability by properly handling empty string cases in the f_strflocaltime function. However, as no official fixed version has been released, users are advised to monitor for updates (GitHub Commit).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management