Bug 2461612 (CVE-2026-40897) - CVE-2026-40897 mathjs: Math.js: Arbitrary code execution via expression parser
Summary: CVE-2026-40897 mathjs: Math.js: Arbitrary code execution via expression parser
Keywords:
Status: NEW
Alias: CVE-2026-40897
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-24 18:02 UTC by OSIDB Bzimport
Modified: 2026-05-04 14:14 UTC (History)
21 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-24 18:02:05 UTC
Math.js is an extensive math library for JavaScript and Node.js. From 13.1.1 to before 15.2.0, a vulnerability allowed executing arbitrary JavaScript via the expression parser of mathjs. You can be affected when you have an application where users can evaluate arbitrary expressions using the mathjs expression parser. This vulnerability is fixed in 15.2.0.


Note You need to log in before you can comment on or make changes to this bug.