A security vulnerability identified in the popular npm package expr-eval opens AI and NLP applications to attacks related to remote code execution. Tracked as CVE-2025-12735, it allows attackers to run arbitrary system commands by crafting malicious inputs in applications vulnerable to it. The expr-eval library was designed to safely parse and evaluate mathematical expressions as a secure alternative to JavaScript's native eval() function, and was trusted by many developers for doing that. This newly disclosed issue compromises that safety and is a significant risk for organizations using the package. According to researchers at Carnegie Mellon University, the vulnerability is in the way expr-eval lets one define arbitrary functions in the context object of the parser. One can take advantage of this to inject and execute code, thereby controlling application behavior and even executing system-level commands. In the SSVC framework, the vulnerability class would be classified as having Total Technical Impact, where an adversary is given complete control over the impacted software and full access to system resources. This is an especially serious risk for AI and generative NLP systems, as many of them operate on servers handling sensitive data and user-supplied expressions. Given that there are over 250 dependent packages, including oplangchain-a JavaScript implementation of the LangChain framework-the potential impact this vulnerability has on the entire AI ecosystem has become a major security concern. To mitigate the risk, developers should update as soon as possible to expr-eval-fork version 3.0.0, which offers a complete patch. The update brings in an allowlist of safe functions, requires explicit registration of custom functions, and comes with enhanced security tests. The vulnerability was responsibly disclosed by security researcher Jangwoo Choe (UKO) and fixed through GitHub Pull Request #288. Affected projects can detect and address the problem using npm audit or via the GHSA-jc85-fpwf-qm7x GitHub Security Advisory.
Web server administrators are urged to prioritize a critical update following the release of new versions of Nginx and the community-driven FreeNginx project. These updates address...
Rockstar Games has confirmed a data breach linked to a broader security incident involving Anodot, a third-party data analytics provider. The breach is attributed to the ShinyHunte...
A critical vulnerability identified as CVE 2026 5194 has been discovered in the wolfSSL SSL TLS library affecting how certificate signatures are verified. The flaw allows improper ...