chore(deps): bump vitest to 4.1.6 (GHSA-2h32-95rg-cppp)#1632
Merged
Conversation
Vitest browser mode (`@vitest/browser`) served the `otelCarrier` query parameter unsanitized inside an inline module script. A crafted URL opened against a running Vitest browser server could execute attacker JavaScript in the server origin, recover `VITEST_API_TOKEN`, and chain to local RCE via the browser API (`writeFile` into `vite.config.ts`). Patched range pulled in for every `@vitest/*` package vendored under `@voidzero-dev/vite-plus-test`, plus the workspace catalog and the `vitest-dev` npm alias. - CVSS v3.1: 9.6 (critical) - Vulnerable: @vitest/browser >=4.0.17, <4.1.6 - Patched: 4.1.6 Advisory: GHSA-2h32-95rg-cppp
|
Review the following changes in direct dependencies. Learn more about Socket for GitHub.
|
Member
Author
|
@cursor review |
There was a problem hiding this comment.
✅ Bugbot reviewed your changes and found no new issues!
Comment @cursor review or bugbot run to trigger another review on this PR
Reviewed by Cursor Bugbot for commit e795ca5. Configure here.
vite-plus
@voidzero-dev/vite-plus-core
@voidzero-dev/vite-plus-prompts
@voidzero-dev/vite-plus-test
@voidzero-dev/vite-plus-cli-darwin-arm64
@voidzero-dev/vite-plus-cli-darwin-x64
@voidzero-dev/vite-plus-cli-linux-arm64-gnu
@voidzero-dev/vite-plus-cli-linux-arm64-musl
@voidzero-dev/vite-plus-cli-linux-x64-gnu
@voidzero-dev/vite-plus-cli-linux-x64-musl
@voidzero-dev/vite-plus-cli-win32-arm64-msvc
@voidzero-dev/vite-plus-cli-win32-x64-msvc
@voidzero-dev/vite-plus-darwin-arm64
@voidzero-dev/vite-plus-darwin-x64
@voidzero-dev/vite-plus-linux-arm64-gnu
@voidzero-dev/vite-plus-linux-arm64-musl
@voidzero-dev/vite-plus-linux-x64-gnu
@voidzero-dev/vite-plus-linux-x64-musl
@voidzero-dev/vite-plus-win32-arm64-msvc
@voidzero-dev/vite-plus-win32-x64-msvc
commit: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
vitest security update GHSA-2h32-95rg-cppp
Note
Low Risk
Low risk dependency-only update; main risk is potential test runner behavior changes/regressions from the Vitest patch release.
Overview
Updates the workspace’s Vitest stack from
4.1.5to4.1.6, includingvitest-devand all@vitest/*companion packages (browser, runners, coverage, UI).Refreshes
pnpm-lock.yamlandpnpm-workspace.yamloverrides/catalog versions to align dependency resolution on4.1.6(security advisoryGHSA-2h32-95rg-cppp).Reviewed by Cursor Bugbot for commit e795ca5. Configure here.