You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to vulnerable library: /node_modules/postcss/package.json
Dependency Hierarchy:
css-loader-5.2.7.tgz (Root Library)
❌ postcss-8.4.21.tgz (Vulnerable Library)
Found in base branch: main
Vulnerability Details
An issue was discovered in PostCSS before 8.4.31. The vulnerability affects linters using PostCSS to parse external untrusted CSS. An attacker can prepare CSS in such a way that it will contains parts parsed by PostCSS as a CSS comment. After processing by PostCSS, it will be included in the PostCSS output in CSS nodes (rules, properties) despite being included in a comment.
Path to vulnerable library: /node_modules/jsonwebtoken/node_modules/semver/package.json,/node_modules/css-loader/node_modules/semver/package.json
Dependency Hierarchy:
css-loader-5.2.7.tgz (Root Library)
❌ semver-7.3.8.tgz (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.
mend-for-github-combot
changed the title
css-loader-5.2.7.tgz: 1 vulnerabilities (highest severity is: 5.3)
css-loader-5.2.7.tgz: 2 vulnerabilities (highest severity is: 7.5)
Dec 9, 2024
mend-for-github-combot
changed the title
css-loader-5.2.7.tgz: 2 vulnerabilities (highest severity is: 7.5)
css-loader-5.2.7.tgz: 2 vulnerabilities (highest severity is: 5.3)
Dec 13, 2024
mend-for-github-combot
changed the title
css-loader-5.2.7.tgz: 2 vulnerabilities (highest severity is: 5.3)
css-loader-5.2.7.tgz: 3 vulnerabilities (highest severity is: 5.3)
Jan 29, 2025
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/jsonwebtoken/node_modules/semver/package.json,/node_modules/css-loader/node_modules/semver/package.json
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
Vulnerable Library - postcss-8.4.21.tgz
Library home page: https://registry.npmjs.org/postcss/-/postcss-8.4.21.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/postcss/package.json
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
An issue was discovered in PostCSS before 8.4.31. The vulnerability affects linters using PostCSS to parse external untrusted CSS. An attacker can prepare CSS in such a way that it will contains parts parsed by PostCSS as a CSS comment. After processing by PostCSS, it will be included in the PostCSS output in CSS nodes (rules, properties) despite being included in a comment.
Publish Date: 2023-09-29
URL: CVE-2023-44270
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.1%
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-7fh5-64p2-3v2j
Release Date: 2023-09-29
Fix Resolution (postcss): 8.4.31
Direct dependency fix Resolution (css-loader): 6.9.0
⛑️ Automatic Remediation will be attempted for this issue.
Vulnerable Library - semver-7.3.8.tgz
The semantic version parser used by npm.
Library home page: https://registry.npmjs.org/semver/-/semver-7.3.8.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/jsonwebtoken/node_modules/semver/package.json,/node_modules/css-loader/node_modules/semver/package.json
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.
Publish Date: 2023-06-21
URL: CVE-2022-25883
Threat Assessment
Exploit Maturity: Proof of concept
EPSS: 0.5%
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-c2qf-rxjj-qqgw
Release Date: 2023-06-21
Fix Resolution (semver): 7.5.2
Direct dependency fix Resolution (css-loader): 6.9.0
⛑️ Automatic Remediation will be attempted for this issue.
Vulnerable Library - nanoid-3.3.4.tgz
A tiny (116 bytes), secure URL-friendly unique string ID generator
Library home page: https://registry.npmjs.org/nanoid/-/nanoid-3.3.4.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/nanoid/package.json
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
nanoid (aka Nano ID) before 5.0.9 mishandles non-integer values. 3.3.8 is also a fixed version.
Publish Date: 2024-12-09
URL: CVE-2024-55565
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.0%
CVSS 3 Score Details (4.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2024-55565
Release Date: 2024-12-09
Fix Resolution (nanoid): 3.3.8
Direct dependency fix Resolution (css-loader): 6.0.0
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: