GHSA-f5cv-xrv9-r8w7: NoSQL injection in express-cart
N/A
CVSS Score
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
9/1/2020
Updated
1/9/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
express-cart | npm | <= 1.1.7 | 1.1.8 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability report explicitly states both customer and admin login handlers pass JSON parameters directly to MongoDB. In Express
applications, these would typically be route handler functions
processing POST
requests. The lack of input sanitization before constructing database queries with user-controlled values (email/password) makes these handlers vulnerable to operator injection. The $regex
exploitation pattern confirms direct query object manipulation.