{"id":"CVE-2019-10758","details":"mongo-express before 0.54.0 is vulnerable to Remote Code Execution via endpoints that uses the `toBSON` method. A misuse of the `vm` dependency to perform `exec` commands in a non-safe environment.","aliases":["GHSA-h47j-hc6x-h3qq"],"modified":"2026-04-11T18:24:46.492886Z","published":"2019-12-24T22:15:11.183Z","related":["SNYK-JS-MONGOEXPRESS-473215"],"references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-10758"},{"type":"EVIDENCE","url":"https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mongo-express/mongo-express","events":[{"introduced":"0"},{"fixed":"7d365141deadbd38fa961cd835ce68eab5731494"}],"database_specific":{"cpe":"cpe:2.3:a:mongo-express_project:mongo-express:*:*:*:*:*:node.js:*:*","extracted_events":[{"introduced":"0"},{"fixed":"0.54.0"}],"source":"CPE_FIELD"}}],"versions":["0.29.10","v0.10.0","v0.11.0","v0.11.1","v0.11.2","v0.11.3","v0.12.0","v0.13.0","v0.14.0","v0.14.1","v0.15.0","v0.16.0","v0.16.1","v0.17.0","v0.17.1","v0.17.2","v0.17.3","v0.17.4","v0.17.5","v0.2.1","v0.2.2","v0.2.3","v0.27.4","v0.3.0","v0.3.1","v0.3.2","v0.3.3","v0.3.4","v0.32.0","v0.33.0","v0.34.0","v0.35.0","v0.37.0","v0.37.1","v0.37.2","v0.38.0","v0.39.0","v0.39.1","v0.39.2","v0.4.0","v0.40.0","v0.41.0","v0.42.0","v0.42.1","v0.42.2","v0.42.3","v0.43.0","v0.43.1","v0.44.0","v0.45.0","v0.46.0","v0.46.1","v0.47.0","v0.48.0","v0.48.1","v0.49.0","v0.5.0","v0.50.0","v0.51.0","v0.51.1","v0.51.2","v0.52.0","v0.52.1","v0.52.2","v0.53.0","v0.6.0","v0.7.0","v0.7.1","v0.8.0","v0.8.1","v0.9.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-10758.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}]}