-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| obsidian-dataview | npm | <= 0.4.12-hotfix1 | 0.4.13 |
The vulnerability documentation explicitly identifies evalInContext as the vulnerable function responsible for unsafe eval operations. Multiple sources (CVE description, GitHub advisory GHSA-xfg5-vrmc-24wc, and issue #615) directly reference this function's role in executing untrusted input through JavaScript evaluation in the Node.js context. The proof-of-concept demonstrates how attacker-controlled input reaches this eval path, and the patch in 0.4.13 specifically addresses this by disabling JavaScript queries by default.