<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Mathjs — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/mathjs/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 11 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/mathjs/feed.xml" rel="self" type="application/rss+xml"/><item><title>Math.js Improperly Controlled Modification of Object Attributes Leads to RCE</title><link>https://feed.craftedsignal.io/briefs/2026-04-mathjs-rce/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mathjs-rce/</guid><description>A vulnerability in math.js versions before 15.2.0 allows for arbitrary JavaScript execution through the expression parser when evaluating user-supplied expressions.</description><content:encoded><![CDATA[<p>Math.js is a popular open-source mathematics library for JavaScript. A critical vulnerability (GHSA-jvff-x2qm-6286) exists in versions prior to 15.2.0, allowing arbitrary JavaScript execution. This flaw stems from improperly controlled modification of dynamically-determined object attributes within the expression parser. Applications that utilize math.js to evaluate user-provided mathematical expressions are susceptible. The vulnerability was reported on April 10, 2026, and a patch was released in version 15.2.0. Successful exploitation could lead to complete compromise of the application&rsquo;s server-side environment, enabling data theft, system modification, or denial of service.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious mathematical expression designed to exploit the vulnerability in math.js.</li>
<li>The attacker submits the malicious expression to a vulnerable application that uses math.js for expression parsing.</li>
<li>The application&rsquo;s server-side code receives the input and passes it to the math.js <code>evaluate()</code> function.</li>
<li>The vulnerable <code>evaluate()</code> function processes the expression, leading to unintended modification of object attributes.</li>
<li>This modification triggers the execution of arbitrary JavaScript code embedded within the malicious expression.</li>
<li>The attacker&rsquo;s JavaScript code executes within the context of the server-side application, bypassing security controls.</li>
<li>The attacker gains unauthorized access to sensitive data, modifies system configurations, or installs malicious software.</li>
<li>The attacker achieves full remote code execution (RCE), compromising the entire application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to execute arbitrary JavaScript code on the server running the vulnerable application. This can result in complete system compromise, including unauthorized data access, data modification, and denial of service. If the compromised application has access to sensitive databases or internal systems, the attacker can pivot to further compromise the internal network. The vulnerability impacts any application using math.js &lt; 15.2.0 and allows users to evaluate arbitrary expressions, with potentially widespread consequences depending on the application&rsquo;s role and permissions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade math.js to version 15.2.0 or later to patch the vulnerability (GHSA-jvff-x2qm-6286).</li>
<li>If immediate patching is not possible, consider disabling or restricting user-provided expression evaluation functionalities.</li>
<li>Deploy the Sigma rules below to your SIEM to detect potential exploitation attempts against vulnerable math.js instances.</li>
<li>Monitor web server logs for suspicious patterns in user input indicative of expression injection attacks.</li>
<li>Implement input validation and sanitization measures to prevent malicious expressions from reaching the math.js parser.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>mathjs</category><category>rce</category><category>expression-injection</category></item></channel></rss>