-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability documentation explicitly states the 'params' argument of the module function is passed to eval() in line 79 of index.js. Multiple sources (GitHub Advisory, NVD, Snyk) confirm this pattern matches a classic eval injection vulnerability where user-controlled input flows directly into code execution without sanitization. The provided PoC demonstrates how crafted params can execute arbitrary code through this function.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| node-import | npm | <= 0.9.2 |