SYM_JSTS_0085 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

Property Value
Language javascript
Severity low
CWE CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
OWASP A03:2021 - Injection
Confidence Level Low
Impact Level Medium
Likelihood Level Low

Description

The code uses eval(), which executes code constructed as a string. If any part of this string can be influenced by user input or external sources, attackers may run malicious code within your application.

Impact

Exploiting this issue could allow attackers to execute arbitrary JavaScript in your app, leading to data theft, site defacement, or full system compromise. This can result in loss of user trust, data breaches, and potential legal consequences.