This run took 97 seconds.
$ date
--- stdout ---
Sat Mar 14 00:08:16 UTC 2026
--- end ---
$ git clone file:///srv/git/design-codex.git /src/repo --depth=1 -b main
--- stderr ---
Cloning into '/src/repo'...
--- stdout ---
--- end ---
$ git config user.name libraryupgrader
--- stdout ---
--- end ---
$ git config user.email tools.libraryupgrader@tools.wmflabs.org
--- stdout ---
--- end ---
$ git submodule update --init
--- stdout ---
--- end ---
$ grr init
--- stdout ---
Installed commit-msg hook.
--- end ---
$ git show-ref refs/heads/main
--- stdout ---
ccab8e370f0b4756a6cd3eccd549af5812a54815 refs/heads/main
--- end ---
$ /usr/bin/npm audit --json
--- stdout ---
{
"auditReportVersion": 2,
"vulnerabilities": {
"@babel/helpers": {
"name": "@babel/helpers",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1104001,
"name": "@babel/helpers",
"dependency": "@babel/helpers",
"title": "Babel has inefficient RegExp complexity in generated code with .replace when transpiling named capturing groups",
"url": "https://github.com/advisories/GHSA-968p-4wvh-cqc8",
"severity": "moderate",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 6.2,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": "<7.26.10"
}
],
"effects": [],
"range": "<7.26.10",
"nodes": [
"node_modules/@babel/helpers"
],
"fixAvailable": true
},
"@cypress/request": {
"name": "@cypress/request",
"severity": "low",
"isDirect": false,
"via": [
"qs"
],
"effects": [],
"range": "2.88.11 - 3.0.9",
"nodes": [
"node_modules/@cypress/request"
],
"fixAvailable": true
},
"@isaacs/brace-expansion": {
"name": "@isaacs/brace-expansion",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1112954,
"name": "@isaacs/brace-expansion",
"dependency": "@isaacs/brace-expansion",
"title": "@isaacs/brace-expansion has Uncontrolled Resource Consumption",
"url": "https://github.com/advisories/GHSA-7h2j-956f-4vf2",
"severity": "high",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<=5.0.0"
}
],
"effects": [],
"range": "5.0.0",
"nodes": [
"node_modules/@isaacs/brace-expansion"
],
"fixAvailable": true
},
"@mapbox/node-pre-gyp": {
"name": "@mapbox/node-pre-gyp",
"severity": "high",
"isDirect": false,
"via": [
"tar"
],
"effects": [
"@vercel/nft"
],
"range": "<=1.0.11",
"nodes": [
"node_modules/netlify-cli/node_modules/@mapbox/node-pre-gyp"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"@netlify/build": {
"name": "@netlify/build",
"severity": "moderate",
"isDirect": false,
"via": [
"@netlify/edge-bundler",
"@netlify/zip-it-and-ship-it"
],
"effects": [
"netlify-cli"
],
"range": "0.0.24 - 0.0.26 || 9.1.0 - 11.17.0 || 11.37.2 - 12.1.2 || 29.20.8 - 32.1.0",
"nodes": [
"node_modules/netlify-cli/node_modules/@netlify/build"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"@netlify/edge-bundler": {
"name": "@netlify/edge-bundler",
"severity": "high",
"isDirect": false,
"via": [
"@vercel/nft",
"esbuild"
],
"effects": [
"@netlify/build",
"netlify-cli"
],
"range": "8.20.0 - 11.4.0 || 12.0.0 - 13.0.0",
"nodes": [
"node_modules/netlify-cli/node_modules/@netlify/edge-bundler"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"@netlify/functions-utils": {
"name": "@netlify/functions-utils",
"severity": "moderate",
"isDirect": false,
"via": [
"@netlify/zip-it-and-ship-it"
],
"effects": [],
"range": "1.3.14 - 1.3.29 || 1.3.41 || 5.2.24 - 5.3.16",
"nodes": [
"node_modules/netlify-cli/node_modules/@netlify/functions-utils"
],
"fixAvailable": true
},
"@netlify/zip-it-and-ship-it": {
"name": "@netlify/zip-it-and-ship-it",
"severity": "high",
"isDirect": false,
"via": [
"@vercel/nft",
"esbuild"
],
"effects": [
"@netlify/build",
"@netlify/functions-utils",
"netlify-cli"
],
"range": "2.2.0 - 4.2.7 || 4.25.0 - 12.0.3",
"nodes": [
"node_modules/netlify-cli/node_modules/@netlify/zip-it-and-ship-it"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"@octokit/endpoint": {
"name": "@octokit/endpoint",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1113209,
"name": "@octokit/endpoint",
"dependency": "@octokit/endpoint",
"title": "@octokit/endpoint has a Regular Expression in parse that Leads to ReDoS Vulnerability Due to Catastrophic Backtracking",
"url": "https://github.com/advisories/GHSA-x4c5-c7rf-jjgv",
"severity": "moderate",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
"range": ">=9.0.5 <9.0.6"
}
],
"effects": [],
"range": "9.0.5",
"nodes": [
"node_modules/netlify-cli/node_modules/@octokit/endpoint"
],
"fixAvailable": true
},
"@octokit/plugin-paginate-rest": {
"name": "@octokit/plugin-paginate-rest",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1102899,
"name": "@octokit/plugin-paginate-rest",
"dependency": "@octokit/plugin-paginate-rest",
"title": "@octokit/plugin-paginate-rest has a Regular Expression in iterator Leads to ReDoS Vulnerability Due to Catastrophic Backtracking",
"url": "https://github.com/advisories/GHSA-h5c3-5r3r-rr8q",
"severity": "moderate",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
"range": ">=9.3.0-beta.1 <11.4.1"
}
],
"effects": [
"@octokit/rest"
],
"range": "9.3.0-beta.1 - 11.4.0",
"nodes": [
"node_modules/netlify-cli/node_modules/@octokit/plugin-paginate-rest"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"@octokit/request": {
"name": "@octokit/request",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1112248,
"name": "@octokit/request",
"dependency": "@octokit/request",
"title": "@octokit/request has a Regular Expression in fetchWrapper that Leads to ReDoS Vulnerability Due to Catastrophic Backtracking",
"url": "https://github.com/advisories/GHSA-rmvr-2pp2-xj38",
"severity": "moderate",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
"range": ">=1.0.0 <8.4.1"
}
],
"effects": [],
"range": "<=8.4.0",
"nodes": [
"node_modules/netlify-cli/node_modules/@octokit/request"
],
"fixAvailable": true
},
"@octokit/request-error": {
"name": "@octokit/request-error",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1102256,
"name": "@octokit/request-error",
"dependency": "@octokit/request-error",
"title": "@octokit/request-error has a Regular Expression in index that Leads to ReDoS Vulnerability Due to Catastrophic Backtracking",
"url": "https://github.com/advisories/GHSA-xx4v-prfh-6cgc",
"severity": "moderate",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
"range": ">=1.0.0 <5.1.1"
}
],
"effects": [],
"range": "<=5.1.0",
"nodes": [
"node_modules/netlify-cli/node_modules/@octokit/request-error"
],
"fixAvailable": true
},
"@octokit/rest": {
"name": "@octokit/rest",
"severity": "moderate",
"isDirect": false,
"via": [
"@octokit/plugin-paginate-rest"
],
"effects": [
"netlify-cli"
],
"range": "20.1.1 || 21.0.0-beta.1 - 21.0.0-beta.4",
"nodes": [
"node_modules/netlify-cli/node_modules/@octokit/rest"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"@tootallnate/once": {
"name": "@tootallnate/once",
"severity": "low",
"isDirect": false,
"via": [
{
"source": 1113977,
"name": "@tootallnate/once",
"dependency": "@tootallnate/once",
"title": "@tootallnate/once vulnerable to Incorrect Control Flow Scoping",
"url": "https://github.com/advisories/GHSA-vpq2-c234-7xj6",
"severity": "low",
"cwe": [
"CWE-705"
],
"cvss": {
"score": 3.3,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
"range": "<3.0.1"
}
],
"effects": [
"http-proxy-agent"
],
"range": "<3.0.1",
"nodes": [
"node_modules/@tootallnate/once"
],
"fixAvailable": {
"name": "jest-environment-jsdom",
"version": "30.3.0",
"isSemVerMajor": true
}
},
"@vercel/nft": {
"name": "@vercel/nft",
"severity": "high",
"isDirect": false,
"via": [
"@mapbox/node-pre-gyp"
],
"effects": [
"@netlify/edge-bundler",
"@netlify/zip-it-and-ship-it"
],
"range": "0.12.0 - 0.27.7",
"nodes": [
"node_modules/netlify-cli/node_modules/@vercel/nft"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"@xhmikosr/archive-type": {
"name": "@xhmikosr/archive-type",
"severity": "moderate",
"isDirect": false,
"via": [
"file-type"
],
"effects": [
"@xhmikosr/downloader"
],
"range": "6.0.0 - 7.1.0",
"nodes": [
"node_modules/netlify-cli/node_modules/@xhmikosr/archive-type"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"@xhmikosr/decompress": {
"name": "@xhmikosr/decompress",
"severity": "moderate",
"isDirect": false,
"via": [
"@xhmikosr/decompress-tar",
"@xhmikosr/decompress-tarbz2",
"@xhmikosr/decompress-targz",
"@xhmikosr/decompress-unzip"
],
"effects": [],
"range": "8.0.0 - 10.2.0",
"nodes": [
"node_modules/netlify-cli/node_modules/@xhmikosr/decompress"
],
"fixAvailable": true
},
"@xhmikosr/decompress-tar": {
"name": "@xhmikosr/decompress-tar",
"severity": "moderate",
"isDirect": false,
"via": [
"file-type"
],
"effects": [
"@xhmikosr/decompress",
"@xhmikosr/decompress-tarbz2",
"@xhmikosr/decompress-targz"
],
"range": "6.0.0 - 8.1.0",
"nodes": [
"node_modules/netlify-cli/node_modules/@xhmikosr/decompress-tar"
],
"fixAvailable": true
},
"@xhmikosr/decompress-tarbz2": {
"name": "@xhmikosr/decompress-tarbz2",
"severity": "moderate",
"isDirect": false,
"via": [
"@xhmikosr/decompress-tar",
"file-type"
],
"effects": [],
"range": "6.0.0 - 9.0.0",
"nodes": [
"node_modules/netlify-cli/node_modules/@xhmikosr/decompress-tarbz2"
],
"fixAvailable": true
},
"@xhmikosr/decompress-targz": {
"name": "@xhmikosr/decompress-targz",
"severity": "moderate",
"isDirect": false,
"via": [
"@xhmikosr/decompress-tar",
"file-type"
],
"effects": [],
"range": "6.0.0 - 9.0.0",
"nodes": [
"node_modules/netlify-cli/node_modules/@xhmikosr/decompress-targz"
],
"fixAvailable": true
},
"@xhmikosr/decompress-unzip": {
"name": "@xhmikosr/decompress-unzip",
"severity": "moderate",
"isDirect": false,
"via": [
"file-type",
"yauzl"
],
"effects": [],
"range": "<=7.1.0",
"nodes": [
"node_modules/netlify-cli/node_modules/@xhmikosr/decompress-unzip"
],
"fixAvailable": true
},
"@xhmikosr/downloader": {
"name": "@xhmikosr/downloader",
"severity": "moderate",
"isDirect": false,
"via": [
"@xhmikosr/archive-type",
"@xhmikosr/decompress",
"file-type"
],
"effects": [
"gh-release-fetch"
],
"range": "10.0.0 - 10.0.1 || 12.0.0 - 15.2.0",
"nodes": [
"node_modules/netlify-cli/node_modules/@xhmikosr/downloader"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"ajv": {
"name": "ajv",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1113714,
"name": "ajv",
"dependency": "ajv",
"title": "ajv has ReDoS when using `$data` option",
"url": "https://github.com/advisories/GHSA-2g4f-4pwh-qvx6",
"severity": "moderate",
"cwe": [
"CWE-400",
"CWE-1333"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<6.14.0"
},
{
"source": 1113715,
"name": "ajv",
"dependency": "ajv",
"title": "ajv has ReDoS when using `$data` option",
"url": "https://github.com/advisories/GHSA-2g4f-4pwh-qvx6",
"severity": "moderate",
"cwe": [
"CWE-400",
"CWE-1333"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=7.0.0-alpha.0 <8.18.0"
}
],
"effects": [],
"range": "<6.14.0 || >=7.0.0-alpha.0 <8.18.0",
"nodes": [
"node_modules/ajv",
"node_modules/netlify-cli/node_modules/@fastify/ajv-compiler/node_modules/ajv",
"node_modules/netlify-cli/node_modules/@netlify/edge-bundler/node_modules/ajv",
"node_modules/netlify-cli/node_modules/@netlify/framework-info/node_modules/ajv",
"node_modules/netlify-cli/node_modules/ajv",
"node_modules/netlify-cli/node_modules/ajv-formats/node_modules/ajv",
"node_modules/netlify-cli/node_modules/fast-json-stringify/node_modules/ajv",
"node_modules/table/node_modules/ajv"
],
"fixAvailable": true
},
"axios": {
"name": "axios",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1097679,
"name": "axios",
"dependency": "axios",
"title": "Axios Cross-Site Request Forgery Vulnerability",
"url": "https://github.com/advisories/GHSA-wf5p-g6vw-rhxx",
"severity": "moderate",
"cwe": [
"CWE-352"
],
"cvss": {
"score": 6.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
},
"range": ">=0.8.1 <0.28.0"
},
{
"source": 1111034,
"name": "axios",
"dependency": "axios",
"title": "axios Requests Vulnerable To Possible SSRF and Credential Leakage via Absolute URL",
"url": "https://github.com/advisories/GHSA-jr5f-v2jv-69x6",
"severity": "high",
"cwe": [
"CWE-918"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<0.30.0"
},
{
"source": 1113274,
"name": "axios",
"dependency": "axios",
"title": "Axios is Vulnerable to Denial of Service via __proto__ Key in mergeConfig",
"url": "https://github.com/advisories/GHSA-43fc-jf86-j433",
"severity": "high",
"cwe": [
"CWE-754"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": "<=0.30.2"
}
],
"effects": [
"wait-on"
],
"range": "<=0.30.2",
"nodes": [
"node_modules/wait-on/node_modules/axios"
],
"fixAvailable": {
"name": "start-server-and-test",
"version": "2.1.5",
"isSemVerMajor": true
}
},
"body-parser": {
"name": "body-parser",
"severity": "low",
"isDirect": false,
"via": [
"qs"
],
"effects": [
"express"
],
"range": "1.19.0 - 1.20.3 || 2.0.0-beta.1 - 2.0.2",
"nodes": [
"node_modules/netlify-cli/node_modules/body-parser"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"brace-expansion": {
"name": "brace-expansion",
"severity": "low",
"isDirect": false,
"via": [
{
"source": 1105443,
"name": "brace-expansion",
"dependency": "brace-expansion",
"title": "brace-expansion Regular Expression Denial of Service vulnerability",
"url": "https://github.com/advisories/GHSA-v6h2-p8h4-qcjw",
"severity": "low",
"cwe": [
"CWE-400"
],
"cvss": {
"score": 3.1,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
"range": ">=1.0.0 <=1.1.11"
},
{
"source": 1105444,
"name": "brace-expansion",
"dependency": "brace-expansion",
"title": "brace-expansion Regular Expression Denial of Service vulnerability",
"url": "https://github.com/advisories/GHSA-v6h2-p8h4-qcjw",
"severity": "low",
"cwe": [
"CWE-400"
],
"cvss": {
"score": 3.1,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
"range": ">=2.0.0 <=2.0.1"
}
],
"effects": [],
"range": "1.0.0 - 1.1.11 || 2.0.0 - 2.0.1",
"nodes": [
"node_modules/@bundled-es-modules/glob/node_modules/brace-expansion",
"node_modules/@typescript-eslint/typescript-estree/node_modules/brace-expansion",
"node_modules/brace-expansion",
"node_modules/editorconfig/node_modules/brace-expansion",
"node_modules/eslint-plugin-n/node_modules/brace-expansion",
"node_modules/filelist/node_modules/brace-expansion",
"node_modules/js-beautify/node_modules/brace-expansion",
"node_modules/netlify-cli/node_modules/@fastify/static/node_modules/brace-expansion",
"node_modules/netlify-cli/node_modules/@netlify/build-info/node_modules/brace-expansion",
"node_modules/netlify-cli/node_modules/@netlify/build/node_modules/brace-expansion",
"node_modules/netlify-cli/node_modules/@netlify/zip-it-and-ship-it/node_modules/brace-expansion",
"node_modules/netlify-cli/node_modules/archiver-utils/node_modules/brace-expansion",
"node_modules/netlify-cli/node_modules/brace-expansion",
"node_modules/netlify-cli/node_modules/readdir-glob/node_modules/brace-expansion",
"packages/codex-design-tokens/node_modules/brace-expansion",
"packages/codex-docs/node_modules/brace-expansion",
"packages/codex-icons/node_modules/brace-expansion"
],
"fixAvailable": true
},
"cypress": {
"name": "cypress",
"severity": "moderate",
"isDirect": true,
"via": [
"extract-zip",
"yauzl"
],
"effects": [],
"range": ">=0.1.0",
"nodes": [
"node_modules/cypress"
],
"fixAvailable": {
"name": "cypress",
"version": "0.0.1",
"isSemVerMajor": true
}
},
"diff": {
"name": "diff",
"severity": "low",
"isDirect": false,
"via": [
{
"source": 1112704,
"name": "diff",
"dependency": "diff",
"title": "jsdiff has a Denial of Service vulnerability in parsePatch and applyPatch",
"url": "https://github.com/advisories/GHSA-73rr-hh4g-fpgx",
"severity": "low",
"cwe": [
"CWE-400",
"CWE-1333"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=4.0.0 <4.0.4"
}
],
"effects": [],
"range": "4.0.0 - 4.0.3",
"nodes": [
"node_modules/netlify-cli/node_modules/ts-node/node_modules/diff"
],
"fixAvailable": true
},
"editorconfig": {
"name": "editorconfig",
"severity": "high",
"isDirect": false,
"via": [
"minimatch"
],
"effects": [],
"range": "1.0.3 - 1.0.4 || 2.0.0",
"nodes": [
"node_modules/editorconfig"
],
"fixAvailable": true
},
"esbuild": {
"name": "esbuild",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1102341,
"name": "esbuild",
"dependency": "esbuild",
"title": "esbuild enables any website to send any requests to the development server and read the response",
"url": "https://github.com/advisories/GHSA-67mh-4wv8-2f99",
"severity": "moderate",
"cwe": [
"CWE-346"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
},
"range": "<=0.24.2"
}
],
"effects": [
"@netlify/edge-bundler",
"@netlify/zip-it-and-ship-it",
"tsx",
"vite"
],
"range": "<=0.24.2",
"nodes": [
"node_modules/esbuild",
"node_modules/netlify-cli/node_modules/@netlify/edge-bundler/node_modules/esbuild",
"node_modules/netlify-cli/node_modules/esbuild",
"node_modules/vite/node_modules/esbuild",
"node_modules/vitepress/node_modules/esbuild"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"express": {
"name": "express",
"severity": "low",
"isDirect": false,
"via": [
"body-parser",
"qs"
],
"effects": [
"netlify-cli"
],
"range": "4.17.0 - 4.21.2 || 5.0.0-alpha.1 - 5.0.1",
"nodes": [
"node_modules/netlify-cli/node_modules/express"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"external-editor": {
"name": "external-editor",
"severity": "low",
"isDirect": false,
"via": [
"tmp"
],
"effects": [
"inquirer"
],
"range": ">=1.1.1",
"nodes": [
"node_modules/netlify-cli/node_modules/external-editor"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"extract-zip": {
"name": "extract-zip",
"severity": "moderate",
"isDirect": false,
"via": [
"yauzl"
],
"effects": [
"cypress",
"netlify-cli"
],
"range": "*",
"nodes": [
"node_modules/extract-zip",
"node_modules/netlify-cli/node_modules/extract-zip"
],
"fixAvailable": {
"name": "cypress",
"version": "0.0.1",
"isSemVerMajor": true
}
},
"fast-xml-parser": {
"name": "fast-xml-parser",
"severity": "critical",
"isDirect": false,
"via": [
{
"source": 1113153,
"name": "fast-xml-parser",
"dependency": "fast-xml-parser",
"title": "fast-xml-parser has RangeError DoS Numeric Entities Bug",
"url": "https://github.com/advisories/GHSA-37qj-frw5-hhjh",
"severity": "high",
"cwe": [
"CWE-20",
"CWE-248"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": ">=5.0.9 <=5.3.3"
},
{
"source": 1113568,
"name": "fast-xml-parser",
"dependency": "fast-xml-parser",
"title": "fast-xml-parser has an entity encoding bypass via regex injection in DOCTYPE entity names",
"url": "https://github.com/advisories/GHSA-m7jm-9gc2-mpf2",
"severity": "critical",
"cwe": [
"CWE-185"
],
"cvss": {
"score": 9.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:N"
},
"range": ">=5.0.0 <5.3.5"
},
{
"source": 1113569,
"name": "fast-xml-parser",
"dependency": "fast-xml-parser",
"title": "fast-xml-parser affected by DoS through entity expansion in DOCTYPE (no expansion limit)",
"url": "https://github.com/advisories/GHSA-jmr7-xgp7-cmfj",
"severity": "high",
"cwe": [
"CWE-776"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": ">=5.0.0 <5.3.6"
},
{
"source": 1114153,
"name": "fast-xml-parser",
"dependency": "fast-xml-parser",
"title": "fast-xml-parser has stack overflow in XMLBuilder with preserveOrder",
"url": "https://github.com/advisories/GHSA-fj3w-jwp8-x2g3",
"severity": "low",
"cwe": [
"CWE-120"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=5.0.0 <5.3.8"
}
],
"effects": [],
"range": "5.0.0 - 5.3.7",
"nodes": [
"node_modules/fast-xml-parser"
],
"fixAvailable": true
},
"fastify": {
"name": "fastify",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1112876,
"name": "fastify",
"dependency": "fastify",
"title": "Fastify Vulnerable to DoS via Unbounded Memory Allocation in sendWebStream",
"url": "https://github.com/advisories/GHSA-mrq3-vjjr-p77c",
"severity": "low",
"cwe": [
"CWE-770"
],
"cvss": {
"score": 3.7,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
"range": "<=5.7.2"
},
{
"source": 1112877,
"name": "fastify",
"dependency": "fastify",
"title": "Fastify's Content-Type header tab character allows body validation bypass",
"url": "https://github.com/advisories/GHSA-jx2c-rxcm-jvmq",
"severity": "high",
"cwe": [
"CWE-436"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
},
"range": "<5.7.2"
}
],
"effects": [
"netlify-cli"
],
"range": "<=5.7.2",
"nodes": [
"node_modules/netlify-cli/node_modules/fastify"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"file-type": {
"name": "file-type",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1114301,
"name": "file-type",
"dependency": "file-type",
"title": "file-type affected by infinite loop in ASF parser on malformed input with zero-size sub-header",
"url": "https://github.com/advisories/GHSA-5v7r-6r5c-r473",
"severity": "moderate",
"cwe": [
"CWE-835"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
"range": ">=13.0.0 <21.3.1"
}
],
"effects": [
"@xhmikosr/archive-type",
"@xhmikosr/decompress-tar",
"@xhmikosr/decompress-tarbz2",
"@xhmikosr/decompress-targz",
"@xhmikosr/decompress-unzip",
"@xhmikosr/downloader"
],
"range": "13.0.0 - 21.3.0",
"nodes": [
"node_modules/netlify-cli/node_modules/file-type"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"flatted": {
"name": "flatted",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1114526,
"name": "flatted",
"dependency": "flatted",
"title": "flatted vulnerable to unbounded recursion DoS in parse() revive phase",
"url": "https://github.com/advisories/GHSA-25h7-pfq9-p65f",
"severity": "high",
"cwe": [
"CWE-674"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": "<3.4.0"
}
],
"effects": [],
"range": "<3.4.0",
"nodes": [
"node_modules/flatted"
],
"fixAvailable": true
},
"form-data": {
"name": "form-data",
"severity": "critical",
"isDirect": false,
"via": [
{
"source": 1109538,
"name": "form-data",
"dependency": "form-data",
"title": "form-data uses unsafe random function in form-data for choosing boundary",
"url": "https://github.com/advisories/GHSA-fjxv-7rqg-78g4",
"severity": "critical",
"cwe": [
"CWE-330"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=4.0.0 <4.0.4"
}
],
"effects": [],
"range": "4.0.0 - 4.0.3",
"nodes": [
"node_modules/form-data"
],
"fixAvailable": true
},
"gh-release-fetch": {
"name": "gh-release-fetch",
"severity": "moderate",
"isDirect": false,
"via": [
"@xhmikosr/downloader"
],
"effects": [
"netlify-cli"
],
"range": ">=4.0.2",
"nodes": [
"node_modules/netlify-cli/node_modules/gh-release-fetch"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"glob": {
"name": "glob",
"severity": "high",
"isDirect": true,
"via": [
{
"source": 1109842,
"name": "glob",
"dependency": "glob",
"title": "glob CLI: Command injection via -c/--cmd executes matches with shell:true",
"url": "https://github.com/advisories/GHSA-5j98-mcp5-4vw2",
"severity": "high",
"cwe": [
"CWE-78"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
"range": ">=10.2.0 <10.5.0"
},
{
"source": 1109843,
"name": "glob",
"dependency": "glob",
"title": "glob CLI: Command injection via -c/--cmd executes matches with shell:true",
"url": "https://github.com/advisories/GHSA-5j98-mcp5-4vw2",
"severity": "high",
"cwe": [
"CWE-78"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
"range": ">=11.0.0 <11.1.0"
}
],
"effects": [],
"range": "10.2.0 - 10.4.5 || 11.0.0 - 11.0.3",
"nodes": [
"node_modules/@bundled-es-modules/glob/node_modules/glob",
"node_modules/js-beautify/node_modules/glob",
"node_modules/netlify-cli/node_modules/@fastify/static/node_modules/glob",
"node_modules/netlify-cli/node_modules/archiver-utils/node_modules/glob",
"node_modules/svglint/node_modules/glob",
"packages/codex-design-tokens/node_modules/glob",
"packages/codex-docs/node_modules/glob",
"packages/codex-icons/node_modules/glob"
],
"fixAvailable": {
"name": "glob",
"version": "11.1.0",
"isSemVerMajor": false
}
},
"h3": {
"name": "h3",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1112186,
"name": "h3",
"dependency": "h3",
"title": "h3 v1 has Request Smuggling (TE.TE) issue",
"url": "https://github.com/advisories/GHSA-mp2g-9vg9-f4cg",
"severity": "high",
"cwe": [
"CWE-444"
],
"cvss": {
"score": 8.9,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L"
},
"range": "<=1.15.4"
}
],
"effects": [],
"range": "<=1.15.4",
"nodes": [
"node_modules/netlify-cli/node_modules/h3"
],
"fixAvailable": true
},
"http-proxy-agent": {
"name": "http-proxy-agent",
"severity": "low",
"isDirect": false,
"via": [
"@tootallnate/once"
],
"effects": [
"jsdom"
],
"range": "4.0.1 - 5.0.0",
"nodes": [
"node_modules/http-proxy-agent"
],
"fixAvailable": {
"name": "jest-environment-jsdom",
"version": "30.3.0",
"isSemVerMajor": true
}
},
"http-proxy-middleware": {
"name": "http-proxy-middleware",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1104105,
"name": "http-proxy-middleware",
"dependency": "http-proxy-middleware",
"title": "http-proxy-middleware allows fixRequestBody to proceed even if bodyParser has failed",
"url": "https://github.com/advisories/GHSA-9gqv-wp59-fq42",
"severity": "moderate",
"cwe": [
"CWE-754"
],
"cvss": {
"score": 4,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N"
},
"range": ">=1.3.0 <2.0.9"
},
{
"source": 1104106,
"name": "http-proxy-middleware",
"dependency": "http-proxy-middleware",
"title": "http-proxy-middleware can call writeBody twice because \"else if\" is not used",
"url": "https://github.com/advisories/GHSA-4www-5p9h-95mh",
"severity": "moderate",
"cwe": [
"CWE-670"
],
"cvss": {
"score": 4,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L"
},
"range": ">=1.3.0 <2.0.8"
}
],
"effects": [
"netlify-cli"
],
"range": "1.3.0 - 2.0.8",
"nodes": [
"node_modules/netlify-cli/node_modules/http-proxy-middleware"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"inquirer": {
"name": "inquirer",
"severity": "low",
"isDirect": false,
"via": [
"external-editor"
],
"effects": [
"netlify-cli",
"tabtab"
],
"range": "3.0.0 - 8.2.6 || 9.0.0 - 9.3.7",
"nodes": [
"node_modules/netlify-cli/node_modules/inquirer"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"ipx": {
"name": "ipx",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1106842,
"name": "ipx",
"dependency": "ipx",
"title": "IPX Allows Path Traversal via Prefix Matching Bypass",
"url": "https://github.com/advisories/GHSA-mm3p-j368-7jcr",
"severity": "moderate",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=2.0.0-0 <2.1.1"
}
],
"effects": [
"netlify-cli"
],
"range": "2.0.0-0 - 2.1.0",
"nodes": [
"node_modules/netlify-cli/node_modules/ipx"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"jest-environment-jsdom": {
"name": "jest-environment-jsdom",
"severity": "low",
"isDirect": true,
"via": [
"jsdom"
],
"effects": [],
"range": "27.0.1 - 30.0.0-rc.1",
"nodes": [
"node_modules/jest-environment-jsdom"
],
"fixAvailable": {
"name": "jest-environment-jsdom",
"version": "30.3.0",
"isSemVerMajor": true
}
},
"js-yaml": {
"name": "js-yaml",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1112714,
"name": "js-yaml",
"dependency": "js-yaml",
"title": "js-yaml has prototype pollution in merge (<<)",
"url": "https://github.com/advisories/GHSA-mh29-5h37-fv8m",
"severity": "moderate",
"cwe": [
"CWE-1321"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
"range": "<3.14.2"
},
{
"source": 1112715,
"name": "js-yaml",
"dependency": "js-yaml",
"title": "js-yaml has prototype pollution in merge (<<)",
"url": "https://github.com/advisories/GHSA-mh29-5h37-fv8m",
"severity": "moderate",
"cwe": [
"CWE-1321"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
"range": ">=4.0.0 <4.1.1"
}
],
"effects": [
"netlify-cli"
],
"range": "<3.14.2 || >=4.0.0 <4.1.1",
"nodes": [
"node_modules/@istanbuljs/load-nyc-config/node_modules/js-yaml",
"node_modules/js-yaml",
"node_modules/netlify-cli/node_modules/js-yaml"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"jsdom": {
"name": "jsdom",
"severity": "low",
"isDirect": false,
"via": [
"http-proxy-agent"
],
"effects": [
"jest-environment-jsdom"
],
"range": "16.6.0 - 22.1.0",
"nodes": [
"node_modules/jsdom"
],
"fixAvailable": {
"name": "jest-environment-jsdom",
"version": "30.3.0",
"isSemVerMajor": true
}
},
"jws": {
"name": "jws",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1111244,
"name": "jws",
"dependency": "jws",
"title": "auth0/node-jws Improperly Verifies HMAC Signature",
"url": "https://github.com/advisories/GHSA-869p-cjfg-cm3x",
"severity": "high",
"cwe": [
"CWE-347"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
},
"range": "<3.2.3"
}
],
"effects": [],
"range": "<3.2.3",
"nodes": [
"node_modules/netlify-cli/node_modules/jws"
],
"fixAvailable": true
},
"lodash": {
"name": "lodash",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1112455,
"name": "lodash",
"dependency": "lodash",
"title": "Lodash has Prototype Pollution Vulnerability in `_.unset` and `_.omit` functions",
"url": "https://github.com/advisories/GHSA-xxjr-mmjv-4gpg",
"severity": "moderate",
"cwe": [
"CWE-1321"
],
"cvss": {
"score": 6.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
},
"range": ">=4.0.0 <=4.17.22"
}
],
"effects": [
"netlify-cli"
],
"range": "4.0.0 - 4.17.21",
"nodes": [
"node_modules/lodash",
"node_modules/netlify-cli/node_modules/lodash"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"lodash-es": {
"name": "lodash-es",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1112453,
"name": "lodash-es",
"dependency": "lodash-es",
"title": "Lodash has Prototype Pollution Vulnerability in `_.unset` and `_.omit` functions",
"url": "https://github.com/advisories/GHSA-xxjr-mmjv-4gpg",
"severity": "moderate",
"cwe": [
"CWE-1321"
],
"cvss": {
"score": 6.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
},
"range": ">=4.0.0 <=4.17.22"
}
],
"effects": [],
"range": "4.0.0 - 4.17.22",
"nodes": [
"node_modules/netlify-cli/node_modules/lodash-es"
],
"fixAvailable": true
},
"mdast-util-to-hast": {
"name": "mdast-util-to-hast",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1113048,
"name": "mdast-util-to-hast",
"dependency": "mdast-util-to-hast",
"title": "mdast-util-to-hast has unsanitized class attribute",
"url": "https://github.com/advisories/GHSA-4fh9-h7wg-q85m",
"severity": "moderate",
"cwe": [
"CWE-20",
"CWE-915"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
"range": ">=13.0.0 <13.2.1"
}
],
"effects": [],
"range": "13.0.0 - 13.2.0",
"nodes": [
"node_modules/mdast-util-to-hast"
],
"fixAvailable": true
},
"minimatch": {
"name": "minimatch",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1113459,
"name": "minimatch",
"dependency": "minimatch",
"title": "minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern",
"url": "https://github.com/advisories/GHSA-3ppc-4f35-3m26",
"severity": "high",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<3.1.3"
},
{
"source": 1113461,
"name": "minimatch",
"dependency": "minimatch",
"title": "minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern",
"url": "https://github.com/advisories/GHSA-3ppc-4f35-3m26",
"severity": "high",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=5.0.0 <5.1.7"
},
{
"source": 1113465,
"name": "minimatch",
"dependency": "minimatch",
"title": "minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern",
"url": "https://github.com/advisories/GHSA-3ppc-4f35-3m26",
"severity": "high",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=9.0.0 <9.0.6"
},
{
"source": 1113466,
"name": "minimatch",
"dependency": "minimatch",
"title": "minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern",
"url": "https://github.com/advisories/GHSA-3ppc-4f35-3m26",
"severity": "high",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=10.0.0 <10.2.1"
},
{
"source": 1113538,
"name": "minimatch",
"dependency": "minimatch",
"title": "minimatch has ReDoS: matchOne() combinatorial backtracking via multiple non-adjacent GLOBSTAR segments",
"url": "https://github.com/advisories/GHSA-7r86-cg39-jmmj",
"severity": "high",
"cwe": [
"CWE-407"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": "<3.1.3"
},
{
"source": 1113540,
"name": "minimatch",
"dependency": "minimatch",
"title": "minimatch has ReDoS: matchOne() combinatorial backtracking via multiple non-adjacent GLOBSTAR segments",
"url": "https://github.com/advisories/GHSA-7r86-cg39-jmmj",
"severity": "high",
"cwe": [
"CWE-407"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": ">=5.0.0 <5.1.8"
},
{
"source": 1113544,
"name": "minimatch",
"dependency": "minimatch",
"title": "minimatch has ReDoS: matchOne() combinatorial backtracking via multiple non-adjacent GLOBSTAR segments",
"url": "https://github.com/advisories/GHSA-7r86-cg39-jmmj",
"severity": "high",
"cwe": [
"CWE-407"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": ">=9.0.0 <9.0.7"
},
{
"source": 1113545,
"name": "minimatch",
"dependency": "minimatch",
"title": "minimatch has ReDoS: matchOne() combinatorial backtracking via multiple non-adjacent GLOBSTAR segments",
"url": "https://github.com/advisories/GHSA-7r86-cg39-jmmj",
"severity": "high",
"cwe": [
"CWE-407"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": ">=10.0.0 <10.2.3"
},
{
"source": 1113546,
"name": "minimatch",
"dependency": "minimatch",
"title": "minimatch ReDoS: nested *() extglobs generate catastrophically backtracking regular expressions",
"url": "https://github.com/advisories/GHSA-23c5-xmqv-rm74",
"severity": "high",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": "<3.1.4"
},
{
"source": 1113548,
"name": "minimatch",
"dependency": "minimatch",
"title": "minimatch ReDoS: nested *() extglobs generate catastrophically backtracking regular expressions",
"url": "https://github.com/advisories/GHSA-23c5-xmqv-rm74",
"severity": "high",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": ">=5.0.0 <5.1.8"
},
{
"source": 1113552,
"name": "minimatch",
"dependency": "minimatch",
"title": "minimatch ReDoS: nested *() extglobs generate catastrophically backtracking regular expressions",
"url": "https://github.com/advisories/GHSA-23c5-xmqv-rm74",
"severity": "high",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": ">=9.0.0 <9.0.7"
},
{
"source": 1113553,
"name": "minimatch",
"dependency": "minimatch",
"title": "minimatch ReDoS: nested *() extglobs generate catastrophically backtracking regular expressions",
"url": "https://github.com/advisories/GHSA-23c5-xmqv-rm74",
"severity": "high",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": ">=10.0.0 <10.2.3"
}
],
"effects": [
"editorconfig"
],
"range": "<=3.1.3 || 5.0.0 - 5.1.7 || 9.0.0 - 9.0.6 || 10.0.0 - 10.2.2",
"nodes": [
"node_modules/@bundled-es-modules/glob/node_modules/minimatch",
"node_modules/@typescript-eslint/typescript-estree/node_modules/minimatch",
"node_modules/@vue/language-core/node_modules/minimatch",
"node_modules/editorconfig/node_modules/minimatch",
"node_modules/eslint-config-wikimedia/node_modules/minimatch",
"node_modules/eslint-plugin-n/node_modules/minimatch",
"node_modules/filelist/node_modules/minimatch",
"node_modules/js-beautify/node_modules/minimatch",
"node_modules/minimatch",
"node_modules/netlify-cli/node_modules/@fastify/static/node_modules/minimatch",
"node_modules/netlify-cli/node_modules/@netlify/build-info/node_modules/minimatch",
"node_modules/netlify-cli/node_modules/@netlify/build/node_modules/minimatch",
"node_modules/netlify-cli/node_modules/@netlify/zip-it-and-ship-it/node_modules/glob/node_modules/minimatch",
"node_modules/netlify-cli/node_modules/@netlify/zip-it-and-ship-it/node_modules/minimatch",
"node_modules/netlify-cli/node_modules/archiver-utils/node_modules/minimatch",
"node_modules/netlify-cli/node_modules/minimatch",
"node_modules/netlify-cli/node_modules/readdir-glob/node_modules/minimatch",
"node_modules/svglint/node_modules/minimatch",
"packages/codex-design-tokens/node_modules/minimatch",
"packages/codex-docs/node_modules/minimatch",
"packages/codex-icons/node_modules/minimatch"
],
"fixAvailable": true
},
"netlify-cli": {
"name": "netlify-cli",
"severity": "moderate",
"isDirect": true,
"via": [
"@netlify/build",
"@netlify/edge-bundler",
"@netlify/zip-it-and-ship-it",
"@octokit/rest",
"express",
"extract-zip",
"fastify",
"gh-release-fetch",
"http-proxy-middleware",
"inquirer",
"ipx",
"js-yaml",
"lodash",
"tabtab"
],
"effects": [],
"range": ">=2.0.0-alpha.1",
"nodes": [
"node_modules/netlify-cli"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"node-forge": {
"name": "node-forge",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1110996,
"name": "node-forge",
"dependency": "node-forge",
"title": "node-forge has ASN.1 Unbounded Recursion",
"url": "https://github.com/advisories/GHSA-554w-wpv2-vw27",
"severity": "high",
"cwe": [
"CWE-674"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<1.3.2"
},
{
"source": 1110998,
"name": "node-forge",
"dependency": "node-forge",
"title": "node-forge has an Interpretation Conflict vulnerability via its ASN.1 Validator Desynchronization",
"url": "https://github.com/advisories/GHSA-5gfm-wpxj-wjgq",
"severity": "high",
"cwe": [
"CWE-436"
],
"cvss": {
"score": 8.6,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"
},
"range": "<1.3.2"
},
{
"source": 1111068,
"name": "node-forge",
"dependency": "node-forge",
"title": "node-forge is vulnerable to ASN.1 OID Integer Truncation",
"url": "https://github.com/advisories/GHSA-65ch-62r8-g69g",
"severity": "moderate",
"cwe": [
"CWE-190"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<1.3.2"
}
],
"effects": [],
"range": "<=1.3.1",
"nodes": [
"node_modules/netlify-cli/node_modules/node-forge"
],
"fixAvailable": true
},
"on-headers": {
"name": "on-headers",
"severity": "low",
"isDirect": false,
"via": [
{
"source": 1106812,
"name": "on-headers",
"dependency": "on-headers",
"title": "on-headers is vulnerable to http response header manipulation",
"url": "https://github.com/advisories/GHSA-76c9-3jph-rj3q",
"severity": "low",
"cwe": [
"CWE-241"
],
"cvss": {
"score": 3.4,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N"
},
"range": "<1.1.0"
}
],
"effects": [],
"range": "<1.1.0",
"nodes": [
"node_modules/netlify-cli/node_modules/on-headers"
],
"fixAvailable": true
},
"patch-package": {
"name": "patch-package",
"severity": "low",
"isDirect": false,
"via": [
"tmp"
],
"effects": [],
"range": "<=8.0.0 || >=8.1.0-canary",
"nodes": [
"node_modules/patch-package"
],
"fixAvailable": true
},
"preact": {
"name": "preact",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1111984,
"name": "preact",
"dependency": "preact",
"title": "Preact has JSON VNode Injection issue",
"url": "https://github.com/advisories/GHSA-36hm-qxxp-pg3m",
"severity": "high",
"cwe": [
"CWE-843"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=10.26.5 <10.26.10"
}
],
"effects": [],
"range": "10.26.5 - 10.26.9",
"nodes": [
"node_modules/preact"
],
"fixAvailable": true
},
"prismjs": {
"name": "prismjs",
"severity": "moderate",
"isDirect": true,
"via": [
{
"source": 1105770,
"name": "prismjs",
"dependency": "prismjs",
"title": "PrismJS DOM Clobbering vulnerability",
"url": "https://github.com/advisories/GHSA-x7hr-w5r2-h6wg",
"severity": "moderate",
"cwe": [
"CWE-79",
"CWE-94"
],
"cvss": {
"score": 4.9,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N"
},
"range": "<1.30.0"
}
],
"effects": [],
"range": "<1.30.0",
"nodes": [
"node_modules/prismjs"
],
"fixAvailable": {
"name": "prismjs",
"version": "1.30.0",
"isSemVerMajor": false
}
},
"qs": {
"name": "qs",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1113161,
"name": "qs",
"dependency": "qs",
"title": "qs's arrayLimit bypass in comma parsing allows denial of service",
"url": "https://github.com/advisories/GHSA-w7fw-mjwx-w883",
"severity": "low",
"cwe": [
"CWE-20"
],
"cvss": {
"score": 3.7,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
"range": ">=6.7.0 <=6.14.1"
},
{
"source": 1113719,
"name": "qs",
"dependency": "qs",
"title": "qs's arrayLimit bypass in its bracket notation allows DoS via memory exhaustion",
"url": "https://github.com/advisories/GHSA-6rw7-vpxm-498p",
"severity": "moderate",
"cwe": [
"CWE-20"
],
"cvss": {
"score": 3.7,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
"range": "<6.14.1"
}
],
"effects": [
"@cypress/request",
"body-parser",
"express"
],
"range": "<=6.14.1",
"nodes": [
"node_modules/netlify-cli/node_modules/qs",
"node_modules/qs"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"rollup": {
"name": "rollup",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1113515,
"name": "rollup",
"dependency": "rollup",
"title": "Rollup 4 has Arbitrary File Write via Path Traversal",
"url": "https://github.com/advisories/GHSA-mw96-cpmx-2vgc",
"severity": "high",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=4.0.0 <4.59.0"
}
],
"effects": [],
"range": "4.0.0 - 4.58.0",
"nodes": [
"node_modules/netlify-cli/node_modules/rollup",
"node_modules/rollup"
],
"fixAvailable": true
},
"start-server-and-test": {
"name": "start-server-and-test",
"severity": "high",
"isDirect": true,
"via": [
"wait-on"
],
"effects": [],
"range": "1.11.1 - 2.0.2",
"nodes": [
"node_modules/start-server-and-test"
],
"fixAvailable": {
"name": "start-server-and-test",
"version": "2.1.5",
"isSemVerMajor": true
}
},
"svgo": {
"name": "svgo",
"severity": "high",
"isDirect": true,
"via": [
{
"source": 1114150,
"name": "svgo",
"dependency": "svgo",
"title": "SVGO DoS through entity expansion in DOCTYPE (Billion Laughs)",
"url": "https://github.com/advisories/GHSA-xpqw-6gx7-v673",
"severity": "high",
"cwe": [
"CWE-776"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": "=4.0.0"
},
{
"source": 1114151,
"name": "svgo",
"dependency": "svgo",
"title": "SVGO DoS through entity expansion in DOCTYPE (Billion Laughs)",
"url": "https://github.com/advisories/GHSA-xpqw-6gx7-v673",
"severity": "high",
"cwe": [
"CWE-776"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": ">=3.0.0 <3.3.3"
}
],
"effects": [],
"range": "3.0.0 - 3.3.2 || 4.0.0",
"nodes": [
"node_modules/netlify-cli/node_modules/svgo",
"node_modules/svgo"
],
"fixAvailable": {
"name": "svgo",
"version": "4.0.1",
"isSemVerMajor": false
}
},
"tabtab": {
"name": "tabtab",
"severity": "low",
"isDirect": false,
"via": [
"inquirer"
],
"effects": [
"netlify-cli"
],
"range": ">=3.0.0-beta",
"nodes": [
"node_modules/netlify-cli/node_modules/tabtab"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"tar": {
"name": "tar",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1112329,
"name": "tar",
"dependency": "tar",
"title": "Race Condition in node-tar Path Reservations via Unicode Ligature Collisions on macOS APFS",
"url": "https://github.com/advisories/GHSA-r6q2-hw4h-h46w",
"severity": "high",
"cwe": [
"CWE-176"
],
"cvss": {
"score": 8.8,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L"
},
"range": "<=7.5.3"
},
{
"source": 1112659,
"name": "tar",
"dependency": "tar",
"title": "node-tar Vulnerable to Arbitrary File Creation/Overwrite via Hardlink Path Traversal",
"url": "https://github.com/advisories/GHSA-34x7-hfp2-rc4v",
"severity": "high",
"cwe": [
"CWE-22",
"CWE-59"
],
"cvss": {
"score": 8.2,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N"
},
"range": "<7.5.7"
},
{
"source": 1113300,
"name": "tar",
"dependency": "tar",
"title": "node-tar is Vulnerable to Arbitrary File Overwrite and Symlink Poisoning via Insufficient Path Sanitization",
"url": "https://github.com/advisories/GHSA-8qq5-rm4j-mr97",
"severity": "high",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<=7.5.2"
},
{
"source": 1113375,
"name": "tar",
"dependency": "tar",
"title": "Arbitrary File Read/Write via Hardlink Target Escape Through Symlink Chain in node-tar Extraction",
"url": "https://github.com/advisories/GHSA-83g3-92jg-28cx",
"severity": "high",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 7.1,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"
},
"range": "<7.5.8"
},
{
"source": 1114200,
"name": "tar",
"dependency": "tar",
"title": "tar has Hardlink Path Traversal via Drive-Relative Linkpath",
"url": "https://github.com/advisories/GHSA-qffp-2rhf-9h96",
"severity": "high",
"cwe": [
"CWE-22",
"CWE-59"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<=7.5.9"
},
{
"source": 1114302,
"name": "tar",
"dependency": "tar",
"title": "node-tar Symlink Path Traversal via Drive-Relative Linkpath",
"url": "https://github.com/advisories/GHSA-9ppj-qmqm-q256",
"severity": "high",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<=7.5.10"
}
],
"effects": [
"@mapbox/node-pre-gyp"
],
"range": "<=7.5.10",
"nodes": [
"node_modules/netlify-cli/node_modules/tar"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"tar-fs": {
"name": "tar-fs",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1109532,
"name": "tar-fs",
"dependency": "tar-fs",
"title": "tar-fs has a symlink validation bypass if destination directory is predictable with a specific tarball",
"url": "https://github.com/advisories/GHSA-vj76-c3g6-qr5v",
"severity": "high",
"cwe": [
"CWE-22",
"CWE-61"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=2.0.0 <2.1.4"
},
{
"source": 1109534,
"name": "tar-fs",
"dependency": "tar-fs",
"title": "tar-fs has a symlink validation bypass if destination directory is predictable with a specific tarball",
"url": "https://github.com/advisories/GHSA-vj76-c3g6-qr5v",
"severity": "high",
"cwe": [
"CWE-22",
"CWE-61"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=3.0.0 <3.1.1"
},
{
"source": 1109542,
"name": "tar-fs",
"dependency": "tar-fs",
"title": "tar-fs can extract outside the specified dir with a specific tarball",
"url": "https://github.com/advisories/GHSA-8cj5-5rvv-wf4v",
"severity": "high",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=3.0.0 <3.0.9"
},
{
"source": 1109543,
"name": "tar-fs",
"dependency": "tar-fs",
"title": "tar-fs can extract outside the specified dir with a specific tarball",
"url": "https://github.com/advisories/GHSA-8cj5-5rvv-wf4v",
"severity": "high",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=2.0.0 <2.1.3"
},
{
"source": 1109551,
"name": "tar-fs",
"dependency": "tar-fs",
"title": "tar-fs Vulnerable to Link Following and Path Traversal via Extracting a Crafted tar File",
"url": "https://github.com/advisories/GHSA-pq67-2wwv-3xjx",
"severity": "high",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
},
"range": ">=3.0.0 <3.0.7"
},
{
"source": 1109552,
"name": "tar-fs",
"dependency": "tar-fs",
"title": "tar-fs Vulnerable to Link Following and Path Traversal via Extracting a Crafted tar File",
"url": "https://github.com/advisories/GHSA-pq67-2wwv-3xjx",
"severity": "high",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
},
"range": ">=2.0.0 <2.1.2"
}
],
"effects": [],
"range": "2.0.0 - 2.1.3 || 3.0.0 - 3.1.0",
"nodes": [
"node_modules/netlify-cli/node_modules/prebuild-install/node_modules/tar-fs",
"node_modules/netlify-cli/node_modules/tar-fs"
],
"fixAvailable": true
},
"tmp": {
"name": "tmp",
"severity": "low",
"isDirect": false,
"via": [
{
"source": 1109537,
"name": "tmp",
"dependency": "tmp",
"title": "tmp allows arbitrary temporary file / directory write via symbolic link `dir` parameter",
"url": "https://github.com/advisories/GHSA-52f5-9888-hmc6",
"severity": "low",
"cwe": [
"CWE-59"
],
"cvss": {
"score": 2.5,
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"
},
"range": "<=0.2.3"
}
],
"effects": [
"external-editor",
"patch-package"
],
"range": "<=0.2.3",
"nodes": [
"node_modules/netlify-cli/node_modules/tmp",
"node_modules/netlify-cli/node_modules/tmp-promise/node_modules/tmp",
"node_modules/patch-package/node_modules/tmp",
"node_modules/tmp"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "24.2.0",
"isSemVerMajor": true
}
},
"tsx": {
"name": "tsx",
"severity": "moderate",
"isDirect": true,
"via": [
"esbuild"
],
"effects": [],
"range": "3.13.0 - 4.19.2",
"nodes": [
"node_modules/tsx"
],
"fixAvailable": {
"name": "tsx",
"version": "4.21.0",
"isSemVerMajor": false
}
},
"undici": {
"name": "undici",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1101609,
"name": "undici",
"dependency": "undici",
"title": "Use of Insufficiently Random Values in undici",
"url": "https://github.com/advisories/GHSA-c76h-2ccp-4975",
"severity": "moderate",
"cwe": [
"CWE-330"
],
"cvss": {
"score": 6.8,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
},
"range": ">=6.0.0 <6.21.1"
},
{
"source": 1112496,
"name": "undici",
"dependency": "undici",
"title": "Undici has an unbounded decompression chain in HTTP responses on Node.js Fetch API via Content-Encoding leads to resource exhaustion",
"url": "https://github.com/advisories/GHSA-g9mf-h72j-4rw9",
"severity": "moderate",
"cwe": [
"CWE-770"
],
"cvss": {
"score": 5.9,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": "<6.23.0"
},
{
"source": 1113068,
"name": "undici",
"dependency": "undici",
"title": "undici Denial of Service attack via bad certificate data",
"url": "https://github.com/advisories/GHSA-cxrh-j4jr-qwg3",
"severity": "low",
"cwe": [
"CWE-401"
],
"cvss": {
"score": 3.1,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
"range": ">=6.0.0 <6.21.2"
},
{
"source": 1114592,
"name": "undici",
"dependency": "undici",
"title": "Undici: Malicious WebSocket 64-bit length overflows parser and crashes the client",
"url": "https://github.com/advisories/GHSA-f269-vfmq-vjvj",
"severity": "high",
"cwe": [
"CWE-248",
"CWE-1284"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": ">=6.0.0 <6.24.0"
},
{
"source": 1114594,
"name": "undici",
"dependency": "undici",
"title": "Undici has an HTTP Request/Response Smuggling issue",
"url": "https://github.com/advisories/GHSA-2mjp-6q6p-2qxm",
"severity": "moderate",
"cwe": [
"CWE-444"
],
"cvss": {
"score": 6.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
},
"range": "<6.24.0"
},
{
"source": 1114638,
"name": "undici",
"dependency": "undici",
"title": "Undici has Unbounded Memory Consumption in WebSocket permessage-deflate Decompression",
"url": "https://github.com/advisories/GHSA-vrm6-8vpv-qv8q",
"severity": "high",
"cwe": [
"CWE-409"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": "<6.24.0"
},
{
"source": 1114640,
"name": "undici",
"dependency": "undici",
"title": "Undici has Unhandled Exception in WebSocket Client Due to Invalid server_max_window_bits Validation",
"url": "https://github.com/advisories/GHSA-v9p9-hfj2-hcw8",
"severity": "high",
"cwe": [
"CWE-248"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": "<6.24.0"
},
{
"source": 1114642,
"name": "undici",
"dependency": "undici",
"title": "Undici has CRLF Injection in undici via `upgrade` option",
"url": "https://github.com/advisories/GHSA-4992-7rv2-5pvq",
"severity": "moderate",
"cwe": [
"CWE-93"
],
"cvss": {
"score": 4.6,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"
},
"range": "<6.24.0"
}
],
"effects": [],
"range": "<=6.23.0",
"nodes": [
"node_modules/undici"
],
"fixAvailable": true
},
"vite": {
"name": "vite",
"severity": "moderate",
"isDirect": true,
"via": [
{
"source": 1102438,
"name": "vite",
"dependency": "vite",
"title": "Websites were able to send any requests to the development server and read the response in vite",
"url": "https://github.com/advisories/GHSA-vg6x-rcgg-rjx6",
"severity": "moderate",
"cwe": [
"CWE-346",
"CWE-350",
"CWE-1385"
],
"cvss": {
"score": 6.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
},
"range": ">=6.0.0 <=6.0.8"
},
{
"source": 1103518,
"name": "vite",
"dependency": "vite",
"title": "Vite bypasses server.fs.deny when using ?raw??",
"url": "https://github.com/advisories/GHSA-x574-m823-4x7w",
"severity": "moderate",
"cwe": [
"CWE-200",
"CWE-284"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
},
"range": ">=6.0.0 <6.0.12"
},
{
"source": 1103885,
"name": "vite",
"dependency": "vite",
"title": "Vite has an `server.fs.deny` bypass with an invalid `request-target`",
"url": "https://github.com/advisories/GHSA-356w-63v5-8wf4",
"severity": "moderate",
"cwe": [
"CWE-200"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=6.0.0 <6.0.15"
},
{
"source": 1104174,
"name": "vite",
"dependency": "vite",
"title": "Vite's server.fs.deny bypassed with /. for files under project root",
"url": "https://github.com/advisories/GHSA-859w-5945-r5v3",
"severity": "moderate",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=6.0.0 <=6.1.5"
},
{
"source": 1104203,
"name": "vite",
"dependency": "vite",
"title": "Vite allows server.fs.deny to be bypassed with .svg or relative paths",
"url": "https://github.com/advisories/GHSA-xcj6-pq6g-qj4x",
"severity": "moderate",
"cwe": [
"CWE-200",
"CWE-284"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
},
"range": ">=6.0.0 <6.0.14"
},
{
"source": 1107323,
"name": "vite",
"dependency": "vite",
"title": "Vite middleware may serve files starting with the same name with the public directory",
"url": "https://github.com/advisories/GHSA-g4jq-h2w9-997c",
"severity": "low",
"cwe": [
"CWE-22",
"CWE-200",
"CWE-284"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<=5.4.19"
},
{
"source": 1107324,
"name": "vite",
"dependency": "vite",
"title": "Vite middleware may serve files starting with the same name with the public directory",
"url": "https://github.com/advisories/GHSA-g4jq-h2w9-997c",
"severity": "low",
"cwe": [
"CWE-22",
"CWE-200",
"CWE-284"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=6.0.0 <=6.3.5"
},
{
"source": 1107325,
"name": "vite",
"dependency": "vite",
"title": "Vite middleware may serve files starting with the same name with the public directory",
"url": "https://github.com/advisories/GHSA-g4jq-h2w9-997c",
"severity": "low",
"cwe": [
"CWE-22",
"CWE-200",
"CWE-284"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=7.0.0 <=7.0.6"
},
{
"source": 1107327,
"name": "vite",
"dependency": "vite",
"title": "Vite's `server.fs` settings were not applied to HTML files",
"url": "https://github.com/advisories/GHSA-jqfw-vq24-v9c3",
"severity": "low",
"cwe": [
"CWE-23",
"CWE-200",
"CWE-284"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<=5.4.19"
},
{
"source": 1107328,
"name": "vite",
"dependency": "vite",
"title": "Vite's `server.fs` settings were not applied to HTML files",
"url": "https://github.com/advisories/GHSA-jqfw-vq24-v9c3",
"severity": "low",
"cwe": [
"CWE-23",
"CWE-200",
"CWE-284"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=6.0.0 <=6.3.5"
},
{
"source": 1107329,
"name": "vite",
"dependency": "vite",
"title": "Vite's `server.fs` settings were not applied to HTML files",
"url": "https://github.com/advisories/GHSA-jqfw-vq24-v9c3",
"severity": "low",
"cwe": [
"CWE-23",
"CWE-200",
"CWE-284"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=7.0.0 <=7.0.6"
},
{
"source": 1109131,
"name": "vite",
"dependency": "vite",
"title": "vite allows server.fs.deny bypass via backslash on Windows",
"url": "https://github.com/advisories/GHSA-93m4-6634-74q7",
"severity": "moderate",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=5.2.6 <=5.4.20"
},
{
"source": 1109135,
"name": "vite",
"dependency": "vite",
"title": "vite allows server.fs.deny bypass via backslash on Windows",
"url": "https://github.com/advisories/GHSA-93m4-6634-74q7",
"severity": "moderate",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=6.0.0 <=6.4.0"
},
{
"source": 1109136,
"name": "vite",
"dependency": "vite",
"title": "vite allows server.fs.deny bypass via backslash on Windows",
"url": "https://github.com/advisories/GHSA-93m4-6634-74q7",
"severity": "moderate",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": ">=7.0.0 <=7.0.7"
},
{
"source": 1112512,
"name": "vite",
"dependency": "vite",
"title": "Vite has a `server.fs.deny` bypassed for `inline` and `raw` with `?import` query",
"url": "https://github.com/advisories/GHSA-4r4m-qw57-chr8",
"severity": "moderate",
"cwe": [
"CWE-200",
"CWE-284"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
},
"range": ">=6.0.0 <6.0.13"
},
"esbuild"
],
"effects": [],
"range": "<=6.4.0 || 7.0.0 - 7.0.7",
"nodes": [
"node_modules/vite",
"node_modules/vitepress/node_modules/vite",
"packages/codex-docs/node_modules/vite",
"packages/codex-icons/node_modules/vite",
"packages/codex/node_modules/vite"
],
"fixAvailable": {
"name": "vite",
"version": "7.3.1",
"isSemVerMajor": false
}
},
"wait-on": {
"name": "wait-on",
"severity": "high",
"isDirect": false,
"via": [
"axios"
],
"effects": [
"start-server-and-test"
],
"range": "5.0.0-rc.0 - 7.1.0",
"nodes": [
"node_modules/wait-on"
],
"fixAvailable": {
"name": "start-server-and-test",
"version": "2.1.5",
"isSemVerMajor": true
}
},
"yauzl": {
"name": "yauzl",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1114530,
"name": "yauzl",
"dependency": "yauzl",
"title": "yauzl contains an off-by-one error",
"url": "https://github.com/advisories/GHSA-gmq8-994r-jv83",
"severity": "moderate",
"cwe": [
"CWE-193"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
"range": "<3.2.1"
}
],
"effects": [
"@xhmikosr/decompress-unzip",
"cypress",
"extract-zip"
],
"range": "<3.2.1",
"nodes": [
"node_modules/netlify-cli/node_modules/yauzl",
"node_modules/yauzl"
],
"fixAvailable": {
"name": "cypress",
"version": "0.0.1",
"isSemVerMajor": true
}
}
},
"metadata": {
"vulnerabilities": {
"info": 0,
"low": 15,
"moderate": 33,
"high": 22,
"critical": 2,
"total": 72
},
"dependencies": {
"prod": 141,
"dev": 2572,
"optional": 281,
"peer": 81,
"peerOptional": 0,
"total": 2712
}
}
}
--- end ---
Upgrading n:eslint-config-wikimedia from 0.31.0 -> 0.32.3
$ /usr/bin/npm install
--- stderr ---
npm WARN ERESOLVE overriding peer dependency
npm WARN While resolving: eslint-plugin-wdio@9.25.0
npm WARN Found: eslint@8.57.0
npm WARN node_modules/eslint
npm WARN dev eslint@"8.57.0" from the root project
npm WARN 29 more (@stylistic/eslint-plugin, ...)
npm WARN
npm WARN Could not resolve dependency:
npm WARN peer eslint@"^9.39.2" from eslint-plugin-wdio@9.25.0
npm WARN node_modules/eslint-config-wikimedia/node_modules/eslint-plugin-wdio
npm WARN eslint-plugin-wdio@"^9.16.2" from eslint-config-wikimedia@0.32.3
npm WARN node_modules/eslint-config-wikimedia
npm WARN
npm WARN Conflicting peer dependency: eslint@9.39.4
npm WARN node_modules/eslint
npm WARN peer eslint@"^9.39.2" from eslint-plugin-wdio@9.25.0
npm WARN node_modules/eslint-config-wikimedia/node_modules/eslint-plugin-wdio
npm WARN eslint-plugin-wdio@"^9.16.2" from eslint-config-wikimedia@0.32.3
npm WARN node_modules/eslint-config-wikimedia
npm WARN EBADENGINE Unsupported engine {
npm WARN EBADENGINE package: undefined,
npm WARN EBADENGINE required: { npm: '>=10.8.2', node: '>=20.19.1' },
npm WARN EBADENGINE current: { node: 'v20.19.2', npm: '9.2.0' }
npm WARN EBADENGINE }
npm WARN EBADENGINE Unsupported engine {
npm WARN EBADENGINE package: '@wikimedia/codex@2.4.0',
npm WARN EBADENGINE required: { npm: '>=10.8.2', node: '>=20.19.1' },
npm WARN EBADENGINE current: { node: 'v20.19.2', npm: '9.2.0' }
npm WARN EBADENGINE }
npm WARN EBADENGINE Unsupported engine {
npm WARN EBADENGINE package: '@wikimedia/codex-design-tokens@2.4.0',
npm WARN EBADENGINE required: { npm: '>=10.8.1', node: '>=20.19.1' },
npm WARN EBADENGINE current: { node: 'v20.19.2', npm: '9.2.0' }
npm WARN EBADENGINE }
npm WARN EBADENGINE Unsupported engine {
npm WARN EBADENGINE package: undefined,
npm WARN EBADENGINE required: { npm: '>=10.8.2', node: '>=20.19.1' },
npm WARN EBADENGINE current: { node: 'v20.19.2', npm: '9.2.0' }
npm WARN EBADENGINE }
npm WARN EBADENGINE Unsupported engine {
npm WARN EBADENGINE package: '@wikimedia/codex-icons@2.4.0',
npm WARN EBADENGINE required: { npm: '>=10.8.2', node: '>=20.19.1' },
npm WARN EBADENGINE current: { node: 'v20.19.2', npm: '9.2.0' }
npm WARN EBADENGINE }
npm WARN EBADENGINE Unsupported engine {
npm WARN EBADENGINE package: '@wikimedia/codex@2.4.0',
npm WARN EBADENGINE required: { node: '>=20.19.1', npm: '>=10.8.2' },
npm WARN EBADENGINE current: { node: 'v20.19.2', npm: '9.2.0' }
npm WARN EBADENGINE }
npm WARN EBADENGINE Unsupported engine {
npm WARN EBADENGINE package: '@wikimedia/codex-design-tokens@2.4.0',
npm WARN EBADENGINE required: { node: '>=20.19.1', npm: '>=10.8.1' },
npm WARN EBADENGINE current: { node: 'v20.19.2', npm: '9.2.0' }
npm WARN EBADENGINE }
npm WARN EBADENGINE Unsupported engine {
npm WARN EBADENGINE package: '@wikimedia/codex-icons@2.4.0',
npm WARN EBADENGINE required: { node: '>=20.19.1', npm: '>=10.8.2' },
npm WARN EBADENGINE current: { node: 'v20.19.2', npm: '9.2.0' }
npm WARN EBADENGINE }
npm WARN EBADENGINE Unsupported engine {
npm WARN EBADENGINE package: undefined,
npm WARN EBADENGINE required: { node: '>=20.19.1', npm: '>=10.8.2' },
npm WARN EBADENGINE current: { node: 'v20.19.2', npm: '9.2.0' }
npm WARN EBADENGINE }
npm WARN deprecated inflight@1.0.6: This module is not supported, and leaks memory. Do not use it. Check out lru-cache if you want a good and tested way to coalesce async requests by a key value, which is much more comprehensive and powerful.
npm WARN deprecated rimraf@2.7.1: Rimraf versions prior to v4 are no longer supported
npm WARN deprecated @humanwhocodes/config-array@0.11.14: Use @eslint/config-array instead
npm WARN deprecated rimraf@3.0.2: Rimraf versions prior to v4 are no longer supported
npm WARN deprecated abab@2.0.6: Use your platform's native atob() and btoa() methods instead
npm WARN deprecated glob@7.2.3: Glob versions prior to v9 are no longer supported
npm WARN deprecated @humanwhocodes/object-schema@2.0.3: Use @eslint/object-schema instead
npm WARN deprecated glob@8.1.0: Glob versions prior to v9 are no longer supported
npm WARN deprecated domexception@4.0.0: Use your platform's native DOMException instead
npm WARN deprecated eslint@8.57.0: This version is no longer supported. Please see https://eslint.org/version-support for other options.
--- stdout ---
added 2475 packages, and audited 2482 packages in 1m
469 packages are looking for funding
run `npm fund` for details
72 vulnerabilities (15 low, 33 moderate, 22 high, 2 critical)
To address issues that do not require attention, run:
npm audit fix
To address all issues (including breaking changes), run:
npm audit fix --force
Run `npm audit` for details.
--- end ---
$ package-lock-lint /src/repo/npm-shrinkwrap.json
--- stdout ---
Checking /src/repo/npm-shrinkwrap.json
node_modules/netlify-cli/tools/lint-rules@unknown: Neither "resolved" nor "version" are present
node_modules/@wikimedia/codex-design-tokens@unknown: "resolved" is not a valid URL: "packages/codex-design-tokens" (relative URL without a base)
node_modules/codex-docs@unknown: "resolved" is not a valid URL: "packages/codex-docs" (relative URL without a base)
node_modules/@wikimedia/codex@unknown: "resolved" is not a valid URL: "packages/codex" (relative URL without a base)
node_modules/@wikimedia/codex-icons@unknown: "resolved" is not a valid URL: "packages/codex-icons" (relative URL without a base)
--- end ---
Traceback (most recent call last):
File "/venv/lib/python3.13/site-packages/runner/__init__.py", line 1268, in main
libup.run()
~~~~~~~~~^^
File "/venv/lib/python3.13/site-packages/runner/__init__.py", line 1202, in run
self.npm_upgrade(plan)
~~~~~~~~~~~~~~~~^^^^^^
File "/venv/lib/python3.13/site-packages/runner/__init__.py", line 1046, in npm_upgrade
self.check_package_lock()
~~~~~~~~~~~~~~~~~~~~~~~^^
File "/venv/lib/python3.13/site-packages/runner/utils/npm.py", line 17, in check_package_lock
self.check_call(["package-lock-lint", str(path)])
~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/venv/lib/python3.13/site-packages/runner/shell2.py", line 66, in check_call
res.check_returncode()
~~~~~~~~~~~~~~~~~~~~^^
File "/usr/lib/python3.13/subprocess.py", line 508, in check_returncode
raise CalledProcessError(self.returncode, self.args, self.stdout,
self.stderr)
subprocess.CalledProcessError: Command '['package-lock-lint', '/src/repo/npm-shrinkwrap.json']' returned non-zero exit status 1.