Intel

AIKIDO-2026-10058

jsonrepair is vulnerable to Improper Input Validation

Improper Input Validation Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

43

Medium Risk

This Affects:

JSjsonrepair
3.9.0 - 3.13.1
Fixed in 3.13.2

TL;DR

Affected versions of this package are vulnerable to a Regular Expression Injection via a crafted payload beginning with a forward slash (/), where the mechanism that wraps regex-like strings in double quotes fails to escape existing internal quotes. An attacker can exploit this by supplying an input like /foo"; console.log(-1); "/, where the unescaped quote (") after foo breaks out of the generated string literal, allowing arbitrary JavaScript code execution within contexts like eval or inline <script> tags, as the repaired output becomes is valid, executable code.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

jsonrepair is vulnerable to Improper Input Validation in versions 3.9.0 - 3.13.1.

How to fix this

Upgrade the jsonrepair library to a patch version.