Skip to content

@urql/next Cross-site Scripting vulnerability

High severity GitHub Reviewed Published Jan 30, 2024 in urql-graphql/urql • Updated Jan 30, 2024

Package

npm @urql/next (npm)

Affected versions

< 1.1.1

Patched versions

1.1.1

Description

impact

The @urql/next package is vulnerable to XSS. To exploit this an attacker would need to ensure that the response returns html tags and that the web-application is using streamed responses (non-RSC). This vulnerability is due to improper escaping of html-like characters in the response-stream.

To fix this vulnerability upgrade to version 1.1.1

References

@kitten kitten published to urql-graphql/urql Jan 30, 2024
Published by the National Vulnerability Database Jan 30, 2024
Published to the GitHub Advisory Database Jan 30, 2024
Reviewed Jan 30, 2024
Last updated Jan 30, 2024

Severity

High
7.2
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

Weaknesses

CVE ID

CVE-2024-24556

GHSA ID

GHSA-qhjf-hm5j-335w

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.