### [CVE-2025-48060](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48060) ![](https://img.shields.io/static/v1?label=Product&message=jq&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%3D%201.7.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-121%3A%20Stack-based%20Buffer%20Overflow&color=brightgreen) ### Description jq is a command-line JSON processor. In versions up to and including 1.7.1, a heap-buffer-overflow is present in function `jv_string_vfmt` in the jq_fuzz_execute harness from oss-fuzz. This crash happens on file jv.c, line 1456 `void* p = malloc(sz);`. As of time of publication, no patched versions are available. ### POC #### Reference - https://github.com/jqlang/jq/security/advisories/GHSA-p7rr-28xf-3m5w #### Github - https://github.com/runwhen-contrib/helm-charts - https://github.com/w4zu/Debian_security