An Incredibly Popular JavaScript Library Might Have Some Worrying Malware Issues



  • CVE-2025-12735 in expr-eval allows remote code execution via insecure input evaluation
  • Vulnerable versions ≤2.0.2; patched in 2.0.3 and forked in expr-eval-fork 3.0.0
  • Developers should sanitize variables and avoid untrusted input in evaluate() calls

A widely adopted JavaScript library has been discovered to have a critical vulnerability that could allow threat actors to execute malicious code remotely.

Security researcher Jangwoo Choe discovered an “insufficient input validation” bug in expr-eval, a library with over 800,000 weekly downloads on NPM. Parses and evaluates mathematical expressions from strings and allows developers to safely calculate user-entered formulas. The script is generally used in web applications for calculators, data analysis tools, and expression-based logic.



Leave a Comment

Your email address will not be published. Required fields are marked *