Server Side: JavaScript – Avoid Use Of Eval Function

< 1 min read

Impact Area

Security

 

 

 

 

 

Severity

High

 

 

 

 

 

Affected Element

Access Control

Script Include

Table Transformation Map

Transform Script and Ui Action

Rule number

#

Rule number #

SN-0107-SERVER-SIDE

Impact #

The eval() function evaluates or executes an argument. Improper use of eval() opens up your code for injection attacks and debugging can be more challenging, as no line numbers are displayed with an error.

Remediation #

Avoid the use of eval. It encourages the use of untrusted code. If you must execute arbitrary code, use GlideScriptEvaluator which ensures it came from a record.

Time to fix #

30 min

Code examples #

Noncompliant code #

let value = eval(‘obj.’ + propName);

Compliant code #

let value = eval(gs.getProperty(‘variableWhichHoldsSafeCode’));

Updated on March 21, 2025