Vulnerability DatabaseGHSA-rrqv-vjrw-hrcr

GHSA-rrqv-vjrw-hrcr
JavaScript vulnerability analysis and mitigation

Overview

The security vulnerability (GHSA-rrqv-vjrw-hrcr) affects json-ptr versions prior to v2.1.0, where an unscrupulous actor could execute arbitrary code through the library's .get() method. The vulnerability was discovered and disclosed in March 2021, affecting the npm package json-ptr, which is a complete implementation of JSON Pointer (RFC 6901) for nodejs and modern browsers (GitHub Advisory).

Technical details

The vulnerability stems from the .get() method's failure to properly delimit single quotes when compiling accessors for quickly accessing points in an object graph. This implementation flaw caused the get operation to throw an exception during normal usage and, more critically, allowed for arbitrary code execution when malicious user input was passed directly to the method. The issue was specifically related to the lack of sanitizing user inputs for the pointer's location (Flitbit README).

Impact

The vulnerability allows attackers to execute arbitrary code through the library's .get() method when unsanitized user input is passed to it. This could potentially lead to complete system compromise depending on the context in which the library is used (GitHub Advisory).

Mitigation and workarounds

The primary mitigation is to upgrade to json-ptr version 2.1.0 or higher, which includes the security patch. For users unable to upgrade immediately, the recommended workaround is to ensure proper sanitization of all user input before passing it to any of the methods exposed by the json-ptr library (Flitbit README).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55182CRITICAL10
  • JavaScriptJavaScript
  • react-server-dom-webpack
NoYesDec 03, 2025
CVE-2025-66032HIGH8.7
  • JavaScriptJavaScript
  • @anthropic-ai/claude-code
NoYesDec 03, 2025
CVE-2025-66412HIGH8.5
  • JavaScriptJavaScript
  • @angular/compiler
NoYesDec 01, 2025
CVE-2025-66415MEDIUM6.9
  • JavaScriptJavaScript
  • @fastify/reply-from
NoYesDec 01, 2025
CVE-2025-66404MEDIUM6.4
  • JavaScriptJavaScript
  • mcp-server-kubernetes
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management