Skip to content

[GHSA-jvff-x2qm-6286] mathjs Allows Improperly Controlled Modification of Dynamically-Determined Object Attributes#7364

Merged
advisory-database[bot] merged 1 commit into
marado/advisory-improvement-7364from
marado-GHSA-jvff-x2qm-6286
Apr 14, 2026
Merged

[GHSA-jvff-x2qm-6286] mathjs Allows Improperly Controlled Modification of Dynamically-Determined Object Attributes#7364
advisory-database[bot] merged 1 commit into
marado/advisory-improvement-7364from
marado-GHSA-jvff-x2qm-6286

Conversation

@marado
Copy link
Copy Markdown

@marado marado commented Apr 11, 2026

Updates

  • Affected products
  • Description

Comments
Not all versions < 15.2.0 are affected: the set vulnerability was introduced in 13.1.0, while the other was introduced in 13.1.1. Versions < 13.1.0 are not affected.

@github
Copy link
Copy Markdown
Collaborator

github commented Apr 11, 2026

Hi there @josdejong! A community member has suggested an improvement to your security advisory. If approved, this change will affect the global advisory listed at github.com/advisories. It will not affect the version listed in your project repository.

This change will be reviewed by our Security Curation Team. If you have thoughts or feedback, please share them in a comment here! If this PR has already been closed, you can start a new community contribution for this advisory

@github-actions github-actions Bot changed the base branch from main to marado/advisory-improvement-7364 April 11, 2026 18:37
@shelbyc
Copy link
Copy Markdown
Contributor

shelbyc commented Apr 14, 2026

Hi @marado, I tried looking for commits that showed the introduction of vulnerable code in versions 13.1.0 and 13.1.1. Are these the commits that introduced the vulnerabilities?

@marado
Copy link
Copy Markdown
Author

marado commented Apr 14, 2026

For 13.1.0 the commit would be josdejong/mathjs@bcf0da4

@advisory-database advisory-database Bot merged commit 805f7b3 into marado/advisory-improvement-7364 Apr 14, 2026
4 checks passed
@advisory-database
Copy link
Copy Markdown
Contributor

Hi @marado! Thank you so much for contributing to the GitHub Advisory Database. This database is free, open, and accessible to all, and it's people like you who make it great. Thanks for choosing to help others. We hope you send in more contributions in the future!

@advisory-database advisory-database Bot deleted the marado-GHSA-jvff-x2qm-6286 branch April 14, 2026 15:10
@josdejong
Copy link
Copy Markdown

josdejong commented Apr 15, 2026

Thanks @marado and @shelbyc for looking into this!

I created a single advisory but the GitHub Staff explained that they cannot create a CVE for that because it is about two vulnerabilities, see: https://github.com/josdejong/mathjs/security/advisories/GHSA-jvff-x2qm-6286#advisory-comment-187365.

So in summary:

Vulnerability 1: Unsafe array index getter

Vulnerability 2: Unsafe object property setter

I'm not sure how best to procede so that both vulnerabilities can get a CVE: change the created advisory to describe the first first vulnerability and then create a second advisory? Or create two new advisories?

@shelbyc
Copy link
Copy Markdown
Contributor

shelbyc commented Apr 15, 2026

@josdejong I would recommend changing the description of GHSA-jvff-x2qm-6286 to be about vulnerability 1 and creating a second, separate advisory for vulnerability 2.

@josdejong
Copy link
Copy Markdown

josdejong commented Apr 16, 2026

Thanks Shelby, I'm new to advisories so I wasn't sure for example how permanent things like publishing an advisory are.

I've now created a new advisory and have updated the first one. I've requested a CVE for both.

@shelbyc
Copy link
Copy Markdown
Contributor

shelbyc commented Apr 16, 2026

@josdejong The re-request for GHSA-jvff-x2qm-6286 was closed by mistake about 40 minutes ago, but you should see a message in GHSA-29qv-4j9f-fjw5 inviting you to submit a re-request for GHSA-jvff-x2qm-6286.

@josdejong
Copy link
Copy Markdown

👍 done

@shelbyc
Copy link
Copy Markdown
Contributor

shelbyc commented Apr 18, 2026

Thanks for letting me know! GHSA-5v89-rwgr-qj6g has CVE-2026-41139.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants