An incredibly popular JavaScript library may have some troubling malware issues


  • CVE-2025-12735 in expr-eval allows remote code execution via insecure input evaluation
  • Vulnerable versions ≤2.0.2; patched in 2.0.3 and forked in expr-eval-fork 3.0.0
  • Developers should sanitize variables and avoid unreliable inputs in evaluate() calls

A widespread JavaScript library has been found with a critical vulnerability that could allow threat actors to execute malicious code remotely.

Security researcher Jangwoo Choe discovered an “insufficient input validation” bug in expr-eval, a library with more than 800,000 weekly downloads on NPM. It parses and evaluates mathematical expressions from strings and allows developers to safely calculate user-entered formulas. Generally, the script is used in web apps for calculators, data analysis tools, and expression-based logic.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top