Intel

AIKIDO-2026-10417

jsonpath-python is vulnerable to Remote Code Execution (RCE)

Remote Code Execution (RCE) Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

95

Critical Risk

This Affects:

PYTHONjsonpath-python
0.0.1 - 1.1.4
Fixed in 1.1.5

TL;DR

Affected versions of this package are vulnerable to Improper Input Validation in the handling of JSONPath filter expressions, where user-controlled input is evaluated without sufficient restrictions. This allows attackers to inject malicious expressions that are executed via eval(), leading to remote code execution. An attacker can exploit this by crafting specially formed JSONPath queries, potentially resulting in arbitrary code execution in the context of the application. The issue is fixed by removing or securing the use of eval() in filter evaluation, preventing execution of untrusted input.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

jsonpath-python is vulnerable to Remote Code Execution (RCE) in versions 0.0.1 - 1.1.4.

How to fix this

Upgrade the jsonpath-python library to to the patch version.