๐Ÿ” CVE Alert

CVE-2026-30873

UNKNOWN 0.0

OpenWrt Project jsonpath: Memory leak when processing strings, labels, and regexp tokens

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

OpenWrt Project is a Linux operating system targeting embedded devices. In versions prior to both 24.10.6 and 25.12.1, the jp_get_token function, which performs lexical analysis by breaking input expressions into tokens, contains a memory leak vulnerability when extracting string literals, field labels, and regular expressions using dynamic memory allocation. These extracted results are stored in a jp_opcode struct, which is later copied to a newly allocated jp_opcode object via jp_alloc_op. During this transfer, if a string was previously extracted and stored in the initial jp_opcode, it is copied to the new allocation but the original memory is never freed, resulting in a memory leak. This issue has been fixed in versions 24.10.6 and 25.12.1.

CWE CWE-401
Vendor openwrt
Product openwrt
Published Mar 19, 2026
Last Updated Mar 21, 2026
Stay Ahead of the Next One

Get instant alerts for openwrt openwrt

Be the first to know when new unknown vulnerabilities affecting openwrt openwrt are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

openwrt / openwrt
>= 25.12.0-rc1, < 25.12.1 < 24.10.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openwrt/openwrt/security/advisories/GHSA-rcc6-v4r6-gj4m github.com: https://github.com/openwrt/openwrt/releases/tag/v24.10.6 github.com: https://github.com/openwrt/openwrt/releases/tag/v25.12.1