Skip to content

Conversation

@tobiaslins
Copy link
Collaborator

@tobiaslins tobiaslins commented Jun 13, 2025

Edit: this PR is going to land on canary first since this breaking change will be bundled with PR #183 (contains the version bump)

It also contains version bumps so the Next.js test app could be deployed on Vercel (compromised version can't be deployed anymore)

@tobiaslins tobiaslins requested a review from a team June 13, 2025 11:43
@vercel
Copy link

vercel bot commented Jun 13, 2025

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Review Updated (UTC)
analytics-astro Ready Ready Preview, Comment Dec 22, 2025 5:05pm
analytics-next15 Ready Ready Preview, Comment Dec 22, 2025 5:05pm
analytics-nextjs Ready Ready Preview, Comment Dec 22, 2025 5:05pm
analytics-nuxt Ready Ready Preview, Comment Dec 22, 2025 5:05pm
analytics-remix Ready Ready Preview, Comment Dec 22, 2025 5:05pm
analytics-sveltekit Ready Ready Preview, Comment Dec 22, 2025 5:05pm
analytics-vue Ready Ready Preview, Comment Dec 22, 2025 5:05pm

@tozsolutions
Copy link

ok

@socket-security
Copy link

socket-security bot commented Dec 22, 2025

Caution

Review the following alerts detected in dependencies.

According to your organization's Security Policy, you must resolve all "Block" alerts before proceeding. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Block High
High CVE: Regular Expression Denial of Service (ReDoS) in npm cross-spawn

CVE: GHSA-3xgq-45jj-v275 Regular Expression Denial of Service (ReDoS) in cross-spawn (HIGH)

Affected versions: >= 7.0.0 < 7.0.5; < 6.0.6

Patched version: 7.0.5

From: pnpm-lock.yamlnpm/lint-staged@13.2.2npm/cross-spawn@7.0.3

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/cross-spawn@7.0.3. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block High
High CVE: npm devalue prototype pollution vulnerability

CVE: GHSA-vj54-72f3-p5jv devalue prototype pollution vulnerability (HIGH)

Affected versions: < 5.3.2

Patched version: 5.3.2

From: pnpm-lock.yamlnpm/@sveltejs/kit@2.7.5npm/devalue@5.1.1

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/devalue@5.1.1. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block High
High CVE: npm glob CLI: Command injection via -c/--cmd executes matches with shell:true

CVE: GHSA-5j98-mcp5-4vw2 glob CLI: Command injection via -c/--cmd executes matches with shell:true (HIGH)

Affected versions: >= 11.0.0 < 11.1.0; >= 10.2.0 < 10.5.0

Patched version: 10.5.0

From: pnpm-lock.yamlnpm/tailwindcss@3.4.4npm/@remix-run/dev@2.13.1npm/tsup@8.3.5npm/glob@10.4.5

ℹ Read more on: This package | This alert | What is a CVE?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at support@socket.dev.

Suggestion: Remove or replace dependencies that include known high severity CVEs. Consumers can use dependency overrides or npm audit fix --force to remove vulnerable dependencies.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore npm/glob@10.4.5. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants