-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from improper use of eval() for JSON parsing in the /api/remote endpoint handler. While exact code isn't visible, the advisory explicitly mentions: 1) The attack vector is through /api/remote 2) eval() is used for JSON parsing 3) CWE-77 (Command Injection) classification matches eval() misuse pattern. In Flask applications, endpoint handlers are typically defined in main app files or routes modules. The high confidence comes from the direct correlation between the documented vulnerability characteristics and the common pattern of eval() misuse in web endpoint handlers.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| docsgpt | npm | >= 0.8.1, <= 0.12.0 |
Ongoing coverage of React2Shell