Property
Languagejavascript
Severityhigh
CWECWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)
OWASPA03:2021 - Injection
Confidence LevelHigh
Impact LevelMedium
Likelihood LevelMedium

Description#

User input from web requests (such as query parameters, request bodies, or headers) is being passed to JavaScript’s eval() function. This allows attackers to inject and execute arbitrary code within your application.

Impact#

If exploited, an attacker could run malicious code on your server, potentially leading to data theft, unauthorized system access, or a complete takeover of the application. This poses a serious risk to both user data and the integrity of your system.