CVE-2025-48060Stack-based Buffer Overflow in JQ

Severity
7.7HIGHNVD
OSV6.5
EPSS
0.6%
top 30.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 21
Latest updateJan 15

Description

jq is a command-line JSON processor. In versions up to and including 1.7.1, a heap-buffer-overflow is present in function `jv_string_vfmt` in the jq_fuzz_execute harness from oss-fuzz. This crash happens on file jv.c, line 1456 `void* p = malloc(sz);`. As of time of publication, no patched versions are available.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Packages4 packages

Debianjqlang/jq< 1.6-2.1+deb11u1+3
Ubuntujqlang/jq< 1.6-2.1ubuntu3.1+4
CVEListV5jqlang/jq1.7.1
NVDjqlang/jq1.7.1

🔴Vulnerability Details

4
OSV
jq vulnerabilities2025-07-22
OSV
jq vulnerabilities2025-07-21
OSV
CVE-2025-48060: jq is a command-line JSON processor2025-05-21
CVEList
AddressSanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt)2025-05-21

📋Vendor Advisories

6
Oracle
Oracle Oracle Communications Risk Matrix: Third Party (jq) — CVE-2025-480602026-01-15
Ubuntu
jq vulnerabilities2025-07-22
Ubuntu
jq vulnerabilities2025-07-21
Red Hat
jq: AddressSanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt)2025-05-21
Microsoft
AddressSanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt)2025-05-13
CVE-2025-48060 — Stack-based Buffer Overflow in JQ | cvebase