Skip to content

terser-webpack-plugin-4.2.3.tgz: 16 vulnerabilities (highest severity is: 8.8) [trunk] (reachable) #192

@renovate

Description

@renovate
📂 Vulnerable Library - terser-webpack-plugin-4.2.3.tgz

Terser plugin for webpack

Path to dependency file: /src/Administration/Resources/app/administration/package.json

Findings

Finding Severity 🎯 CVSS Exploit Maturity EPSS Library Type Fixed in Remediation Available Reachability
CVE-2026-23950 🔴 High 8.8 Not Defined < 1% tar-6.1.6.tgz Transitive N/A Unreachable
CVE-2021-37701 🔴 High 8.2 Not Defined < 1% tar-6.1.6.tgz Transitive N/A Unreachable
CVE-2021-37712 🔴 High 8.2 Not Defined < 1% tar-6.1.6.tgz Transitive N/A Unreachable
CVE-2021-37713 🔴 High 8.2 Not Defined < 1% tar-6.1.6.tgz Transitive N/A Unreachable
CVE-2026-24842 🔴 High 8.2 Not Defined < 1% tar-6.1.6.tgz Transitive N/A Unreachable
CVE-2026-23745 🔴 High 7.1 Not Defined < 1% tar-6.1.6.tgz Transitive N/A Unreachable
CVE-2026-26960 🔴 High 7.1 Not Defined < 1% tar-6.1.6.tgz Transitive N/A Unreachable
CVE-2026-29786 🔴 High 7.1 Not Defined < 1% tar-6.1.6.tgz Transitive N/A Unreachable
CVE-2026-31802 🔴 High 7.1 Not Defined < 1% tar-6.1.6.tgz Transitive N/A Unreachable
CVE-2024-28863 🟠 Medium 6.5 Not Defined < 1% tar-6.1.6.tgz Transitive N/A Unreachable
CVE-2024-43788 🟠 Medium 6.4 Not Defined 1.8% webpack-4.46.0.tgz Direct webpack - 5.94.0 Unreachable
CVE-2026-34043 🟠 Medium 5.9 Not Defined < 1% serialize-javascript-5.0.1.tgz Transitive N/A Unreachable
CVE-2024-11831 🟠 Medium 5.4 Not Defined 1.1% serialize-javascript-5.0.1.tgz Transitive N/A Unreachable
CVE-2022-25858 🟠 Medium 5.3 Not Defined 3.6% terser-5.6.0.tgz Transitive N/A Unreachable
CVE-2022-25883 🟠 Medium 5.3 Proof of concept < 1% semver-6.3.0.tgz Transitive N/A Reachable
CVE-2025-69873 🟡 Low 2.9 Not Defined < 1% ajv-6.12.5.tgz Transitive N/A Unreachable

Details

🔴CVE-2026-23950

Vulnerable Library - tar-6.1.6.tgz

tar for node

Library home page: https://registry.npmjs.org/tar/-/tar-6.1.6.tgz

Path to dependency file: /src/Administration/Resources/app/administration/package.json

Dependency Hierarchy:

  • copy-webpack-plugin-6.4.1.tgz (Root Library)

    • cacache-15.0.5.tgz
      • tar-6.1.6.tgz (Vulnerable Library)
  • terser-webpack-plugin-4.2.3.tgz (Root Library)

    • cacache-15.0.5.tgz
      • tar-6.1.6.tgz (Vulnerable Library)

Reachability Analysis

The vulnerable code is unreachable


Vulnerability Details

node-tar,a Tar for Node.js, has a race condition vulnerability in versions up to and including 7.5.3. This is due to an incomplete handling of Unicode path collisions in the "path-reservations" system. On case-insensitive or normalization-insensitive filesystems (such as macOS APFS, In which it has been tested), the library fails to lock colliding paths (e.g., "ß" and "ss"), allowing them to be processed in parallel. This bypasses the library's internal concurrency safeguards and permits Symlink Poisoning attacks via race conditions. The library uses a "PathReservations" system to ensure that metadata checks and file operations for the same path are serialized. This prevents race conditions where one entry might clobber another concurrently. This is a Race Condition which enables Arbitrary File Overwrite. This vulnerability affects users and systems using node-tar on macOS (APFS/HFS+). Because of using "NFD" Unicode normalization (in which "ß" and "ss" are different), conflicting paths do not have their order properly preserved under filesystems that ignore Unicode normalization (e.g., APFS (in which "ß" causes an inode collision with "ss")). This enables an attacker to circumvent internal parallelization locks ("PathReservations") using conflicting filenames within a malicious tar archive. The patch in version 7.5.4 updates "path-reservations.js" to use a normalization form that matches the target filesystem's behavior (e.g., "NFKD"), followed by first "toLocaleLowerCase('en')" and then "toLocaleUpperCase('en')". As a workaround, users who cannot upgrade promptly, and who are programmatically using "node-tar" to extract arbitrary tarball data should filter out all "SymbolicLink" entries (as npm does) to defend against arbitrary file writes via this file system entry name collision issue.

Publish Date: Jan 20, 2026 12:40 AM

URL: CVE-2026-23950

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 8.8


Suggested Fix

Type: Upgrade version

Origin: GHSA-r6q2-hw4h-h46w

Release Date: Jan 20, 2026 12:40 AM

Fix Resolution : https://github.com/isaacs/node-tar.git - v7.5.4,tar - 7.5.4

🔴CVE-2021-37701

Vulnerable Library - tar-6.1.6.tgz

tar for node

Library home page: https://registry.npmjs.org/tar/-/tar-6.1.6.tgz

Path to dependency file: /src/Administration/Resources/app/administration/package.json

Dependency Hierarchy:

  • copy-webpack-plugin-6.4.1.tgz (Root Library)

    • cacache-15.0.5.tgz
      • tar-6.1.6.tgz (Vulnerable Library)
  • terser-webpack-plugin-4.2.3.tgz (Root Library)

    • cacache-15.0.5.tgz
      • tar-6.1.6.tgz (Vulnerable Library)

Reachability Analysis

The vulnerable code is unreachable


Vulnerability Details

The npm package "tar" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both "" and "/" characters as path separators, however "" is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at "FOO", followed by a symbolic link named "foo", then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but not from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the "FOO" directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.
Mend Note: The description of this vulnerability differs from MITRE.

Publish Date: Aug 31, 2021 12:00 AM

URL: CVE-2021-37701

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 8.2


Suggested Fix

Type: Upgrade version

Origin: GHSA-9r2w-394v-53qc

Release Date: Aug 31, 2021 12:00 AM

Fix Resolution : tar - 4.4.16,5.0.8,6.1.7

🔴CVE-2021-37712

Vulnerable Library - tar-6.1.6.tgz

tar for node

Library home page: https://registry.npmjs.org/tar/-/tar-6.1.6.tgz

Path to dependency file: /src/Administration/Resources/app/administration/package.json

Dependency Hierarchy:

  • copy-webpack-plugin-6.4.1.tgz (Root Library)

    • cacache-15.0.5.tgz
      • tar-6.1.6.tgz (Vulnerable Library)
  • terser-webpack-plugin-4.2.3.tgz (Root Library)

    • cacache-15.0.5.tgz
      • tar-6.1.6.tgz (Vulnerable Library)

Reachability Analysis

The vulnerable code is unreachable


Vulnerability Details

The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 "short path" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.

Publish Date: Aug 31, 2021 12:00 AM

URL: CVE-2021-37712

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 8.2


Suggested Fix

Type: Upgrade version

Origin:

Release Date:

Fix Resolution :

🔴CVE-2021-37713

Vulnerable Library - tar-6.1.6.tgz

tar for node

Library home page: https://registry.npmjs.org/tar/-/tar-6.1.6.tgz

Path to dependency file: /src/Administration/Resources/app/administration/package.json

Dependency Hierarchy:

  • copy-webpack-plugin-6.4.1.tgz (Root Library)

    • cacache-15.0.5.tgz
      • tar-6.1.6.tgz (Vulnerable Library)
  • terser-webpack-plugin-4.2.3.tgz (Root Library)

    • cacache-15.0.5.tgz
      • tar-6.1.6.tgz (Vulnerable Library)

Reachability Analysis

The vulnerable code is unreachable


Vulnerability Details

The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain ".." path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as "C:some\path". If the drive letter does not match the extraction target, for example "D:\extraction\dir", then the result of "path.resolve(extractionDirectory, entryPath)" would resolve against the current working directory on the "C:" drive, rather than the extraction target directory. Additionally, a ".." portion of the path could occur immediately after the drive letter, such as "C:../foo", and was not properly sanitized by the logic that checked for ".." within the normalized and split portions of the path. This only affects users of "node-tar" on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.
Mend Note: The description of this vulnerability differs from MITRE.

Publish Date: Aug 31, 2021 04:50 PM

URL: CVE-2021-37713

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 8.2


Suggested Fix

Type: Upgrade version

Origin: GHSA-5955-9wpr-37jh

Release Date: Aug 31, 2021 04:50 PM

Fix Resolution : tar - 4.4.18,5.0.10,6.1.9

🔴CVE-2026-24842

Vulnerable Library - tar-6.1.6.tgz

tar for node

Library home page: https://registry.npmjs.org/tar/-/tar-6.1.6.tgz

Path to dependency file: /src/Administration/Resources/app/administration/package.json

Dependency Hierarchy:

  • copy-webpack-plugin-6.4.1.tgz (Root Library)

    • cacache-15.0.5.tgz
      • tar-6.1.6.tgz (Vulnerable Library)
  • terser-webpack-plugin-4.2.3.tgz (Root Library)

    • cacache-15.0.5.tgz
      • tar-6.1.6.tgz (Vulnerable Library)

Reachability Analysis

The vulnerable code is unreachable


Vulnerability Details

node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary files outside the extraction directory. Version 7.5.7 contains a fix for the issue.

Publish Date: Jan 28, 2026 12:20 AM

URL: CVE-2026-24842

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 8.2


Suggested Fix

Type: Upgrade version

Origin: isaacs/node-tar@f4a7aa9

Release Date: Jan 28, 2026 12:20 AM

Fix Resolution : tar - 7.5.7,https://github.com/isaacs/node-tar.git - v7.5.7

🔴CVE-2026-23745

Vulnerable Library - tar-6.1.6.tgz

tar for node

Library home page: https://registry.npmjs.org/tar/-/tar-6.1.6.tgz

Path to dependency file: /src/Administration/Resources/app/administration/package.json

Dependency Hierarchy:

  • copy-webpack-plugin-6.4.1.tgz (Root Library)

    • cacache-15.0.5.tgz
      • tar-6.1.6.tgz (Vulnerable Library)
  • terser-webpack-plugin-4.2.3.tgz (Root Library)

    • cacache-15.0.5.tgz
      • tar-6.1.6.tgz (Vulnerable Library)

Reachability Analysis

The vulnerable code is unreachable


Vulnerability Details

node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.

Publish Date: Jan 16, 2026 10:00 PM

URL: CVE-2026-23745

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 7.1


Suggested Fix

Type: Upgrade version

Origin: isaacs/node-tar@340eb28

Release Date: Jan 16, 2026 10:00 PM

Fix Resolution : https://github.com/isaacs/node-tar.git - v7.5.3

🔴CVE-2026-26960

Vulnerable Library - tar-6.1.6.tgz

tar for node

Library home page: https://registry.npmjs.org/tar/-/tar-6.1.6.tgz

Path to dependency file: /src/Administration/Resources/app/administration/package.json

Dependency Hierarchy:

  • copy-webpack-plugin-6.4.1.tgz (Root Library)

    • cacache-15.0.5.tgz
      • tar-6.1.6.tgz (Vulnerable Library)
  • terser-webpack-plugin-4.2.3.tgz (Root Library)

    • cacache-15.0.5.tgz
      • tar-6.1.6.tgz (Vulnerable Library)

Reachability Analysis

The vulnerable code is unreachable


Vulnerability Details

node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.

Publish Date: Feb 20, 2026 01:07 AM

URL: CVE-2026-26960

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 7.1


Suggested Fix

Type: Upgrade version

Origin: isaacs/node-tar@d18e4e1

Release Date: Feb 18, 2026 02:28 AM

Fix Resolution : https://github.com/isaacs/node-tar.git - v7.5.8,tar - 7.5.8

🔴CVE-2026-29786

Vulnerable Library - tar-6.1.6.tgz

tar for node

Library home page: https://registry.npmjs.org/tar/-/tar-6.1.6.tgz

Path to dependency file: /src/Administration/Resources/app/administration/package.json

Dependency Hierarchy:

  • copy-webpack-plugin-6.4.1.tgz (Root Library)

    • cacache-15.0.5.tgz
      • tar-6.1.6.tgz (Vulnerable Library)
  • terser-webpack-plugin-4.2.3.tgz (Root Library)

    • cacache-15.0.5.tgz
      • tar-6.1.6.tgz (Vulnerable Library)

Reachability Analysis

The vulnerable code is unreachable


Vulnerability Details

node-tar is a full-featured Tar for Node.js. Prior to version 7.5.10, tar can be tricked into creating a hardlink that points outside the extraction directory by using a drive-relative link target such as C:../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This issue has been patched in version 7.5.10.

Publish Date: Mar 07, 2026 03:32 PM

URL: CVE-2026-29786

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 7.1


Suggested Fix

Type: Upgrade version

Origin: isaacs/node-tar@7bc755d

Release Date: Mar 07, 2026 03:32 PM

Fix Resolution : https://github.com/isaacs/node-tar.git - v7.5.10

🔴CVE-2026-31802

Vulnerable Library - tar-6.1.6.tgz

tar for node

Library home page: https://registry.npmjs.org/tar/-/tar-6.1.6.tgz

Path to dependency file: /src/Administration/Resources/app/administration/package.json

Dependency Hierarchy:

  • copy-webpack-plugin-6.4.1.tgz (Root Library)

    • cacache-15.0.5.tgz
      • tar-6.1.6.tgz (Vulnerable Library)
  • terser-webpack-plugin-4.2.3.tgz (Root Library)

    • cacache-15.0.5.tgz
      • tar-6.1.6.tgz (Vulnerable Library)

Reachability Analysis

The vulnerable code is unreachable


Vulnerability Details

node-tar is a full-featured Tar for Node.js. Prior to version 7.5.11, tar (npm) can be tricked into creating a symlink that points outside the extraction directory by using a drive-relative symlink target such as C:../../../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This vulnerability is fixed in 7.5.11.

Publish Date: Mar 09, 2026 09:11 PM

URL: CVE-2026-31802

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 7.1


Suggested Fix

Type: Upgrade version

Origin: isaacs/node-tar@f48b5fa

Release Date: Mar 09, 2026 09:11 PM

Fix Resolution : https://github.com/isaacs/node-tar.git - v7.5.11

🟠CVE-2024-28863

Vulnerable Library - tar-6.1.6.tgz

tar for node

Library home page: https://registry.npmjs.org/tar/-/tar-6.1.6.tgz

Path to dependency file: /src/Administration/Resources/app/administration/package.json

Dependency Hierarchy:

  • copy-webpack-plugin-6.4.1.tgz (Root Library)

    • cacache-15.0.5.tgz
      • tar-6.1.6.tgz (Vulnerable Library)
  • terser-webpack-plugin-4.2.3.tgz (Root Library)

    • cacache-15.0.5.tgz
      • tar-6.1.6.tgz (Vulnerable Library)

Reachability Analysis

The vulnerable code is unreachable


Vulnerability Details

node-tar is a Tar for Node.js. node-tar prior to version 6.2.1 has no limit on the number of sub-folders created in the folder creation process. An attacker who generates a large number of sub-folders can consume memory on the system running node-tar and even crash the Node.js client within few seconds of running it using a path with too many sub-folders inside. Version 6.2.1 fixes this issue by preventing extraction in excessively deep sub-folders.

Publish Date: Mar 21, 2024 10:10 PM

URL: CVE-2024-28863

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 6.5


Suggested Fix

Type: Upgrade version

Origin:

Release Date:

Fix Resolution :

🟠CVE-2024-43788

Vulnerable Library - webpack-4.46.0.tgz

Packs CommonJs/AMD modules for the browser. Allows to split your codebase into multiple bundles, which can be loaded on demand. Support loaders to preprocess files, i.e. json, jsx, es7, css, less, ... and your custom stuff.

Library home page: https://registry.npmjs.org/webpack/-/webpack-4.46.0.tgz

Path to dependency file: /src/Administration/Resources/app/administration/package.json

Dependency Hierarchy:

  • webpack-4.46.0.tgz (Vulnerable Library)

  • worker-loader-3.0.4.tgz (Root Library)

    • webpack-4.46.0.tgz (Vulnerable Library)
  • webpack-dev-server-3.11.3.tgz (Root Library)

    • webpack-4.46.0.tgz (Vulnerable Library)
  • optimize-css-assets-webpack-plugin-5.0.8.tgz (Root Library)

    • webpack-4.46.0.tgz (Vulnerable Library)
  • webpack-plugin-injector-1.0.6.tgz (Root Library)

    • copy-webpack-plugin-5.1.2.tgz
      • webpack-4.46.0.tgz (Vulnerable Library)
  • copy-webpack-plugin-6.4.1.tgz (Root Library)

    • webpack-4.46.0.tgz (Vulnerable Library)
  • terser-webpack-plugin-4.2.3.tgz (Root Library)

    • webpack-4.46.0.tgz (Vulnerable Library)
  • webpack-cli-3.3.12.tgz (Root Library)

    • webpack-4.46.0.tgz (Vulnerable Library)
  • ts-loader-8.4.0.tgz (Root Library)

    • webpack-4.46.0.tgz (Vulnerable Library)
  • fork-ts-checker-webpack-plugin-6.5.3.tgz (Root Library)

    • webpack-4.46.0.tgz (Vulnerable Library)

Reachability Analysis

The vulnerable code is unreachable


Vulnerability Details

Webpack is a module bundler. Its main purpose is to bundle JavaScript files for usage in a browser, yet it is also capable of transforming, bundling, or packaging just about any resource or asset. The webpack developers have discovered a DOM Clobbering vulnerability in Webpack’s "AutoPublicPathRuntimeModule". The DOM Clobbering gadget in the module can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an "img" tag with an unsanitized "name" attribute) are present. Real-world exploitation of this gadget has been observed in the Canvas LMS which allows a XSS attack to happen through a javascript code compiled by Webpack (the vulnerable part is from Webpack). DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script, seemingly benign HTML markups in the webpage (e.g. through a post or comment) and leverages the gadgets (pieces of js code) living in the existing javascript code to transform it into executable code. This vulnerability can lead to cross-site scripting (XSS) on websites that include Webpack-generated files and allow users to inject certain scriptless HTML tags with improperly sanitized name or id attributes. This issue has been addressed in release version 5.94.0. All users are advised to upgrade. There are no known workarounds for this issue.

Publish Date: Aug 27, 2024 05:07 PM

URL: CVE-2024-43788

Threat Assessment

Exploit Maturity:Not Defined

EPSS:1.8%

Score: 6.4


Suggested Fix

Type: Upgrade version

Origin: GHSA-4vvj-4cpr-p986

Release Date: Aug 27, 2024 05:07 PM

Fix Resolution : webpack - 5.94.0

🟠CVE-2026-34043

Vulnerable Library - serialize-javascript-5.0.1.tgz

Serialize JavaScript to a superset of JSON that includes regular expressions and functions.

Library home page: https://registry.npmjs.org/serialize-javascript/-/serialize-javascript-5.0.1.tgz

Path to dependency file: /src/Administration/Resources/app/administration/package.json

Dependency Hierarchy:

  • copy-webpack-plugin-6.4.1.tgz (Root Library)

    • serialize-javascript-5.0.1.tgz (Vulnerable Library)
  • terser-webpack-plugin-4.2.3.tgz (Root Library)

    • serialize-javascript-5.0.1.tgz (Vulnerable Library)

Reachability Analysis

The vulnerable code is unreachable


Vulnerability Details

Serialize JavaScript to a superset of JSON that includes regular expressions and functions. Prior to version 7.0.5, there is a Denial of Service (DoS) vulnerability caused by CPU exhaustion. When serializing a specially crafted "array-like" object (an object that inherits from Array.prototype but has a very large length property), the process enters an intensive loop that consumes 100% CPU and hangs indefinitely. This issue has been patched in version 7.0.5.

Publish Date: Mar 31, 2026 01:48 AM

URL: CVE-2026-34043

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 5.9


Suggested Fix

Type: Upgrade version

Origin: yahoo/serialize-javascript@f147e90

Release Date: Mar 28, 2026 09:06 AM

Fix Resolution : https://github.com/yahoo/serialize-javascript.git - v7.0.5

🟠CVE-2024-11831

Vulnerable Library - serialize-javascript-5.0.1.tgz

Serialize JavaScript to a superset of JSON that includes regular expressions and functions.

Library home page: https://registry.npmjs.org/serialize-javascript/-/serialize-javascript-5.0.1.tgz

Path to dependency file: /src/Administration/Resources/app/administration/package.json

Dependency Hierarchy:

  • copy-webpack-plugin-6.4.1.tgz (Root Library)

    • serialize-javascript-5.0.1.tgz (Vulnerable Library)
  • terser-webpack-plugin-4.2.3.tgz (Root Library)

    • serialize-javascript-5.0.1.tgz (Vulnerable Library)

Reachability Analysis

The vulnerable code is unreachable


Vulnerability Details

A flaw was found in npm-serialize-javascript. The vulnerability occurs because the serialize-javascript module does not properly sanitize certain inputs, such as regex or other JavaScript object types, allowing an attacker to inject malicious code. This code could be executed when deserialized by a web browser, causing Cross-site scripting (XSS) attacks. This issue is critical in environments where serialized data is sent to web clients, potentially compromising the security of the website or web application using this package.

Publish Date: Feb 10, 2025 03:27 PM

URL: CVE-2024-11831

Threat Assessment

Exploit Maturity:Not Defined

EPSS:1.1%

Score: 5.4


Suggested Fix

Type: Upgrade version

Origin: GHSA-76p7-773f-r4q5

Release Date: Feb 10, 2025 03:27 PM

Fix Resolution : serialize-javascript - 6.0.2

🟠CVE-2022-25858

Vulnerable Library - terser-5.6.0.tgz

JavaScript parser, mangler/compressor and beautifier toolkit for ES6+

Library home page: https://registry.npmjs.org/terser/-/terser-5.6.0.tgz

Path to dependency file: /src/Administration/Resources/app/administration/package.json

Dependency Hierarchy:

  • terser-webpack-plugin-4.2.3.tgz (Root Library)
    • terser-5.6.0.tgz (Vulnerable Library)

Reachability Analysis

The vulnerable code is unreachable


Vulnerability Details

The package terser before 4.8.1, from 5.0.0 and before 5.14.2 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure usage of regular expressions.

Publish Date: Jul 15, 2022 08:00 PM

URL: CVE-2022-25858

Threat Assessment

Exploit Maturity:Not Defined

EPSS:3.6%

Score: 5.3


Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25858

Release Date: Jul 15, 2022 08:00 PM

Fix Resolution : terser - 4.8.1,5.14.2

🟠CVE-2022-25883

Vulnerable Library - semver-6.3.0.tgz

The semantic version parser used by npm.

Library home page: https://registry.npmjs.org/semver/-/semver-6.3.0.tgz

Path to dependency file: /src/Administration/Resources/app/administration/build/nuxt-component-library/package.json

Dependency Hierarchy:

  • webpack-dev-server-3.11.3.tgz (Root Library)

    • semver-6.3.0.tgz (Vulnerable Library)
  • e2e-testsuite-platform-7.0.5.tgz (Root Library)

    • preset-env-7.14.9.tgz
      • babel-plugin-polyfill-corejs2-0.2.3.tgz
        • helper-define-polyfill-provider-0.2.4.tgz
          • semver-6.3.0.tgz (Vulnerable Library)
  • copy-webpack-plugin-6.4.1.tgz (Root Library)

    • find-cache-dir-3.3.1.tgz
      • make-dir-3.1.0.tgz
        • semver-6.3.0.tgz (Vulnerable Library)
  • babel-jest-29.5.0.tgz (Root Library)

    • babel-plugin-istanbul-6.1.1.tgz
      • istanbul-lib-instrument-5.2.0.tgz
        • semver-6.3.0.tgz (Vulnerable Library)
  • eslint-config-base-2.0.0.tgz (Root Library)

    • eslint-config-airbnb-base-15.0.0.tgz
      • semver-6.3.0.tgz (Vulnerable Library)
  • sass-loader-8.0.2.tgz (Root Library)

    • semver-6.3.0.tgz (Vulnerable Library)
  • core-7.20.12.tgz (Root Library)

    • semver-6.3.0.tgz (Vulnerable Library)
  • cli-0.9.0.tgz (Root Library)

    • update-notifier-3.0.1.tgz
      • latest-version-5.1.0.tgz
        • package-json-6.5.0.tgz
          • semver-6.3.0.tgz (Vulnerable Library)
  • ts-jest-29.0.3.tgz (Root Library)

    • jest-29.5.0.tgz
      • core-29.5.0.tgz
        • reporters-29.5.0.tgz
          • istanbul-lib-report-3.0.0.tgz
            • make-dir-3.1.0.tgz
              • semver-6.3.0.tgz (Vulnerable Library)
  • nuxt-2.10.2.tgz (Root Library)

    • builder-2.10.2.tgz
      • semver-6.3.0.tgz (Vulnerable Library)
  • terser-webpack-plugin-4.2.3.tgz (Root Library)

    • find-cache-dir-3.3.1.tgz
      • make-dir-3.1.0.tgz
        • semver-6.3.0.tgz (Vulnerable Library)
  • optional-chaining-codemod-1.7.0.tgz (Root Library)

    • jscodeshift-0.13.1.tgz
      • preset-env-7.20.2.tgz
        • semver-6.3.0.tgz (Vulnerable Library)
  • preset-typescript-7.21.0.tgz (Root Library)

    • core-7.21.3.tgz
      • helper-compilation-targets-7.21.4.tgz
        • semver-6.3.0.tgz (Vulnerable Library)
  • lighthouse-9.2.0.tgz (Root Library)

    • configstore-5.0.1.tgz
      • make-dir-3.1.0.tgz
        • semver-6.3.0.tgz (Vulnerable Library)
  • lighthouse-9.6.8.tgz (Root Library)

    • configstore-5.0.1.tgz
      • make-dir-3.1.0.tgz
        • semver-6.3.0.tgz (Vulnerable Library)

Reachability Analysis

This vulnerability is potentially reachable:

- administration-1.0.0/webpack.config.js (Application)
    - copy-webpack-plugin-6.4.1/dist/cjs.js (Extension)
        - copy-webpack-plugin-6.4.1/dist/index.js (Extension)
            - find-cache-dir-3.3.1/index.js (Extension)
                - make-dir-3.1.0/index.js (Extension)
                    -> ❌ semver-6.3.0/semver.js (Vulnerable Component)

Vulnerability Details

Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.
Mend Note: The description of this vulnerability differs from MITRE.

Publish Date: Jun 21, 2023 05:00 AM

URL: CVE-2022-25883

Threat Assessment

Exploit Maturity:Proof of concept

EPSS:< 1%

Score: 5.3


Suggested Fix

Type: Upgrade version

Origin: GHSA-c2qf-rxjj-qqgw

Release Date: Jun 21, 2023 05:00 AM

Fix Resolution : semver - 5.7.2,6.3.1,7.5.2;org.webjars.npm:semver:7.5.2

🟡CVE-2025-69873

Vulnerable Library - ajv-6.12.5.tgz

Another JSON Schema Validator

Library home page: https://registry.npmjs.org/ajv/-/ajv-6.12.5.tgz

Path to dependency file: /src/Administration/Resources/app/administration/package.json

Dependency Hierarchy:

  • webpack-4.46.0.tgz (Root Library)

    • schema-utils-1.0.0.tgz
      • ajv-6.12.5.tgz (Vulnerable Library)
  • worker-loader-3.0.4.tgz (Root Library)

    • schema-utils-3.3.0.tgz
      • ajv-6.12.5.tgz (Vulnerable Library)
  • copy-webpack-plugin-6.4.1.tgz (Root Library)

    • schema-utils-3.0.0.tgz
      • ajv-6.12.5.tgz (Vulnerable Library)
  • terser-webpack-plugin-4.2.3.tgz (Root Library)

    • schema-utils-3.0.0.tgz
      • ajv-6.12.5.tgz (Vulnerable Library)
  • eslint-config-base-2.0.0.tgz (Root Library)

    • eslint-8.36.0.tgz
      • ajv-6.12.5.tgz (Vulnerable Library)
  • fork-ts-checker-webpack-plugin-6.5.3.tgz (Root Library)

    • schema-utils-2.7.0.tgz
      • ajv-6.12.5.tgz (Vulnerable Library)

Reachability Analysis

The vulnerable code is unreachable


Vulnerability Details

ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is passed directly to the JavaScript RegExp() constructor without validation. An attacker can inject a malicious regex pattern (e.g., "^(a|a)*$") combined with crafted input to cause catastrophic backtracking. A 31-character payload causes approximately 44 seconds of CPU blocking, with each additional character doubling execution time. This enables complete denial of service with a single HTTP request against any API using ajv with $data: true for dynamic schema validation. This issue is also fixed in version 6.14.0.

Publish Date: Feb 11, 2026 12:00 AM

URL: CVE-2025-69873

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 2.9


Suggested Fix

Type: Upgrade version

Origin: GHSA-2g4f-4pwh-qvx6

Release Date: Feb 11, 2026 12:00 AM

Fix Resolution : https://github.com/ajv-validator/ajv.git - v8.18.0,https://github.com/ajv-validator/ajv.git - v6.14.0

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions