@openrewrite/recipes-nodejs 0.37.0-20251221-170424 → 0.37.0-20251222-170441
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -3576,6 +3576,7 @@ CVE-2024-57082,2025-02-06T06:31:26Z,"@rpldy/uploader prototype pollution",@rpldy
|
|
|
3576
3576
|
CVE-2024-57083,2025-03-28T21:30:47Z,"Redoc Prototype Pollution via `Module.mergeObjects` Component",redoc,0,2.4.0,,HIGH,CWE-1321
|
|
3577
3577
|
CVE-2024-57085,2025-02-06T06:31:26Z,"@stryker-mutator/util vulnerable to Prototype Pollution",@stryker-mutator/util,0,8.7.1,,HIGH,CWE-1321;CWE-400
|
|
3578
3578
|
CVE-2024-57086,2025-02-06T06:31:26Z,"node-opcua-alarm-condition prototype pollution vulnerability","node-opcua-alarm-condition",0,2.137.0,,HIGH,CWE-1321
|
|
3579
|
+
CVE-2024-57177,2025-02-10T21:31:39Z,"CouchAuth has a Server-Side Template Injection vulnerability in its email functionality",@perfood/couch-auth,0,,0.21.2,MODERATE,CWE-1336;CWE-74
|
|
3579
3580
|
CVE-2024-57186,2025-06-10T18:32:27Z,"Erxes Path Traversal vulnerability",erxes,0,1.6.2,,HIGH,CWE-22
|
|
3580
3581
|
CVE-2024-57189,2025-06-10T18:32:27Z,"Erxes Path Traversal vulnerability",erxes,0,1.6.2,,MODERATE,CWE-22;CWE-24
|
|
3581
3582
|
CVE-2024-57190,2025-06-10T18:32:27Z,"Erxes Incorrect Access Control vulnerability",erxes,0,1.6.1,,HIGH,CWE-284;CWE-287
|
|
@@ -3633,6 +3634,7 @@ CVE-2025-1302,2025-02-15T06:30:51Z,"JSONPath Plus allows Remote Code Execution",
|
|
|
3633
3634
|
CVE-2025-13033,2025-10-07T13:42:02Z,"Nodemailer: Email to an unintended domain can occur due to Interpretation Conflict",nodemailer,0,7.0.7,,MODERATE,CWE-20;CWE-436
|
|
3634
3635
|
CVE-2025-13204,2025-11-14T18:31:39Z,"expr-eval vulnerable to Prototype Pollution",expr-eval,0,,2.0.2,HIGH,CWE-1321
|
|
3635
3636
|
CVE-2025-13204,2025-11-14T18:31:39Z,"expr-eval vulnerable to Prototype Pollution",expr-eval-fork,0,2.0.2,,HIGH,CWE-1321
|
|
3637
|
+
CVE-2025-13321,2025-12-17T21:30:48Z,"Mattermost Desktop App exposes sensitive information in its application logs",mattermost-desktop,0,,3.6.0,LOW,CWE-532
|
|
3636
3638
|
CVE-2025-13437,2025-11-20T18:31:01Z,"zx Uses Incorrectly-Resolved Name or Reference",zx,0,8.8.5,,MODERATE,CWE-706
|
|
3637
3639
|
CVE-2025-13466,2025-11-25T14:20:21Z,"body-parser is vulnerable to denial of service when url encoding is used",body-parser,2.2.0,2.2.1,,MODERATE,CWE-400
|
|
3638
3640
|
CVE-2025-13877,2025-12-09T17:42:53Z,"Authentication Bypass via Default JWT Secret in NocoBase docker-compose Deployments",@nocobase/auth,0,1.9.0-beta.18,,MODERATE,CWE-1320;CWE-321
|
|
@@ -3641,6 +3643,7 @@ CVE-2025-13877,2025-12-09T17:42:53Z,"Authentication Bypass via Default JWT Secre
|
|
|
3641
3643
|
CVE-2025-1398,2025-03-17T15:31:50Z,"Mattermost Desktop App allows the bypass of Transparency, Consent, and Control (TCC) via code injection",mattermost-desktop,0,5.11.0,,LOW,CWE-426
|
|
3642
3644
|
CVE-2025-14284,2025-12-09T18:30:35Z,"@tiptap/extension-link vulnerable to Cross-site Scripting (XSS)",@tiptap/extension-link,0,2.10.4,,LOW,CWE-79
|
|
3643
3645
|
CVE-2025-1467,2025-02-23T18:30:24Z,"tarteaucitron Cross-site Scripting (XSS)",tarteaucitronjs,0,1.17.0,,LOW,CWE-79
|
|
3646
|
+
CVE-2025-14874,2025-12-18T09:30:30Z,"Nodemailer is vulnerable to DoS through Uncontrolled Recursion",nodemailer,0,7.0.11,,MODERATE,CWE-674;CWE-703
|
|
3644
3647
|
CVE-2025-1520,2025-04-23T18:30:58Z,"PostHog Plugin Server SQL Injection Vulnerability",@posthog/plugin-server,0,,1.10.7,HIGH,CWE-89
|
|
3645
3648
|
CVE-2025-1691,2025-02-27T15:31:51Z,"MongoDB Shell may be susceptible to Control Character Injection via autocomplete",mongosh,0,2.3.9,,HIGH,CWE-74
|
|
3646
3649
|
CVE-2025-1692,2025-02-27T15:31:51Z,"MongoDB Shell may be susceptible to control character injection via pasting",mongosh,0,2.3.9,,MODERATE,CWE-150
|
|
@@ -3991,8 +3994,8 @@ CVE-2025-54313,2025-07-19T18:30:33Z,"eslint-config-prettier, eslint-plugin-prett
|
|
|
3991
3994
|
CVE-2025-54313,2025-07-19T18:30:33Z,"eslint-config-prettier, eslint-plugin-prettier, synckit, @pkgr/core, napi-postinstall have embedded malicious code",got-fetch,5.1.11,6.0.0,,HIGH,CWE-506
|
|
3992
3995
|
CVE-2025-54313,2025-07-19T18:30:33Z,"eslint-config-prettier, eslint-plugin-prettier, synckit, @pkgr/core, napi-postinstall have embedded malicious code",napi-postinstall,0.3.1,0.3.2,,HIGH,CWE-506
|
|
3993
3996
|
CVE-2025-54313,2025-07-19T18:30:33Z,"eslint-config-prettier, eslint-plugin-prettier, synckit, @pkgr/core, napi-postinstall have embedded malicious code",synckit,0.11.9,0.11.10,,HIGH,CWE-506
|
|
3994
|
-
CVE-2025-54369,2025-07-25T14:08:50Z,"Node-SAML SAML Authentication Bypass",@node-saml/node-saml,0,5.1.0,,CRITICAL,CWE-287;CWE-347
|
|
3995
|
-
CVE-2025-54369,2025-07-25T14:08:50Z,"Node-SAML SAML Authentication Bypass",node-saml,0,,3.1.2,CRITICAL,CWE-287;CWE-347
|
|
3997
|
+
CVE-2025-54369,2025-07-25T14:08:50Z,"Node-SAML SAML Authentication Bypass",@node-saml/node-saml,0,5.1.0,,CRITICAL,CWE-287;CWE-347;CWE-87
|
|
3998
|
+
CVE-2025-54369,2025-07-25T14:08:50Z,"Node-SAML SAML Authentication Bypass",node-saml,0,,3.1.2,CRITICAL,CWE-287;CWE-347;CWE-87
|
|
3996
3999
|
CVE-2025-54371,2025-07-23T16:49:38Z,"Withdrawn Advisory: Axios has Transitive Critical Vulnerability via form-data",axios,1.10.0,1.11.0,,HIGH,
|
|
3997
4000
|
CVE-2025-54378,2025-07-25T20:10:22Z,"HAX CMS API Lacks Authorization Checks",@haxtheweb/haxcms-nodejs,0,11.0.14,,HIGH,CWE-285;CWE-862
|
|
3998
4001
|
CVE-2025-54387,2025-08-04T14:48:25Z,"IPX Allows Path Traversal via Prefix Matching Bypass",ipx,0,1.3.2,,MODERATE,CWE-22
|
|
@@ -4317,6 +4320,7 @@ CVE-2025-66219,2025-11-26T22:09:27Z,"willitmerge has a Command Injection vulnera
|
|
|
4317
4320
|
CVE-2025-6624,2025-06-26T06:31:04Z,"Snyk CLI Insertion of Sensitive Information into Log File allowed in DEBUG or DEBUG/TRACE mode",snyk,0,1.1297.3,,LOW,CWE-532
|
|
4318
4321
|
CVE-2025-66400,2025-12-02T01:25:46Z,"mdast-util-to-hast has unsanitized class attribute",mdast-util-to-hast,13.0.0,13.2.1,,MODERATE,CWE-20;CWE-915
|
|
4319
4322
|
CVE-2025-66401,2025-12-02T00:38:14Z,"MCP Watch has a Critical Command Injection in cloneRepo allows Remote Code Execution (RCE) via malicious URL",mcp-watch,0,,0.1.2,CRITICAL,CWE-78
|
|
4323
|
+
CVE-2025-66402,2025-12-15T20:55:27Z,"misskey.js's export data contains private post data",misskey-js,13.0.0-beta.16,2025.12.0,,HIGH,CWE-862
|
|
4320
4324
|
CVE-2025-66404,2025-12-03T20:44:45Z,"mcp-server-kubernetes has potential security issue in exec_in_pod tool",mcp-server-kubernetes,0,2.9.8,,MODERATE,CWE-77
|
|
4321
4325
|
CVE-2025-66405,2025-12-02T01:08:37Z,"Portkey.ai Gateway: Server-Side Request Forgery (SSRF) in Custom Host",@portkey-ai/gateway,0,1.14.0,,MODERATE,CWE-918
|
|
4322
4326
|
CVE-2025-66412,2025-12-02T01:20:30Z,"Angular Stored XSS Vulnerability via SVG Animation, SVG URL and MathML Attributes",@angular/compiler,0,,18.2.14,HIGH,CWE-79
|
|
@@ -4336,6 +4340,7 @@ CVE-2025-66421,2025-11-30T03:30:26Z,"Tryton sao allows XSS because it does not e
|
|
|
4336
4340
|
CVE-2025-66456,2025-12-09T17:11:53Z,"Elysia vulnerable to prototype pollution with multiple standalone schema validation",elysia,1.4.0,1.4.17,,CRITICAL,CWE-1321
|
|
4337
4341
|
CVE-2025-66457,2025-12-09T17:12:05Z,"Elysia affected by arbitrary code injection through cookie config",elysia,0,1.4.18,,HIGH,CWE-94
|
|
4338
4342
|
CVE-2025-66479,2025-12-04T16:55:06Z,"Anthropic Sandbox Runtime Incorrectly Implemented Network Sandboxing ","@anthropic-ai/sandbox-runtime",0,0.0.16,,LOW,CWE-693
|
|
4343
|
+
CVE-2025-66482,2025-12-15T20:59:59Z,"Misskey has a login rate limit bypass via spoofed X-Forwarded-For header",misskey-js,2025.9.1,2025.12.0-alpha.2,,MODERATE,CWE-1188;CWE-307
|
|
4339
4344
|
CVE-2025-67489,2025-12-08T22:16:31Z,"@vitejs/plugin-rsc Remote Code Execution through unsafe dynamic imports in RSC server function APIs on development server",@vitejs/plugin-rsc,0,0.5.6,,CRITICAL,CWE-94
|
|
4340
4345
|
CVE-2025-67490,2025-12-10T21:31:24Z,"Improper Request Caching Lookup in the Auth0 Next.js SDK",@auth0/nextjs-auth0,4.11.0,4.11.2,,MODERATE,CWE-863
|
|
4341
4346
|
CVE-2025-67490,2025-12-10T21:31:24Z,"Improper Request Caching Lookup in the Auth0 Next.js SDK",@auth0/nextjs-auth0,4.12.0,4.12.1,,MODERATE,CWE-863
|
|
@@ -4353,6 +4358,24 @@ CVE-2025-67779,2025-12-12T16:32:43Z,"Denial of Service Vulnerability in React Se
|
|
|
4353
4358
|
CVE-2025-67779,2025-12-12T16:32:43Z,"Denial of Service Vulnerability in React Server Components",react-server-dom-webpack,19.0.2,19.0.3,,HIGH,CWE-400;CWE-502
|
|
4354
4359
|
CVE-2025-67779,2025-12-12T16:32:43Z,"Denial of Service Vulnerability in React Server Components",react-server-dom-webpack,19.1.3,19.1.4,,HIGH,CWE-400;CWE-502
|
|
4355
4360
|
CVE-2025-67779,2025-12-12T16:32:43Z,"Denial of Service Vulnerability in React Server Components",react-server-dom-webpack,19.2.2,19.2.3,,HIGH,CWE-400;CWE-502
|
|
4361
|
+
CVE-2025-67898,2025-12-15T00:30:25Z,"MJML allows mj-include directory traversal due to an incomplete fix for CVE-2020-12827",mjml,0,,4.18.0,MODERATE,CWE-36
|
|
4362
|
+
CVE-2025-68113,2025-12-16T00:43:52Z,"ALTCHA Proof-of-Work Vulnerable to Challenge Splicing and Replay",altcha-lib,0,1.4.1,,MODERATE,CWE-115;CWE-347
|
|
4363
|
+
CVE-2025-68115,2025-12-16T19:36:37Z,"Parse Server has a Cross-Site Scripting (XSS) vulnerability via Unescaped Mustache Template Variables",parse-server,0,8.6.1,,MODERATE,CWE-79
|
|
4364
|
+
CVE-2025-68115,2025-12-16T19:36:37Z,"Parse Server has a Cross-Site Scripting (XSS) vulnerability via Unescaped Mustache Template Variables",parse-server,9.0.0,9.1.0-alpha.3,,MODERATE,CWE-79
|
|
4365
|
+
CVE-2025-68130,2025-12-16T19:37:57Z,"tRPC has possible prototype pollution in `experimental_nextAppDirCaller`",@trpc/server,10.27.0,10.45.3,,HIGH,CWE-1321
|
|
4366
|
+
CVE-2025-68130,2025-12-16T19:37:57Z,"tRPC has possible prototype pollution in `experimental_nextAppDirCaller`",@trpc/server,11.0.0,11.8.0,,HIGH,CWE-1321
|
|
4367
|
+
CVE-2025-68150,2025-12-16T22:35:40Z,"Parse Server is vulnerable to Server-Side Request Forgery (SSRF) via Instagram OAuth Adapter",parse-server,0,8.6.2,,HIGH,CWE-918
|
|
4368
|
+
CVE-2025-68150,2025-12-16T22:35:40Z,"Parse Server is vulnerable to Server-Side Request Forgery (SSRF) via Instagram OAuth Adapter",parse-server,9.0.0,9.1.1.alpha.1,,HIGH,CWE-918
|
|
4369
|
+
CVE-2025-68154,2025-12-16T22:37:23Z,"systeminformation has a Command Injection vulnerability in fsSize() function on Windows",systeminformation,0,5.27.14,,HIGH,CWE-78
|
|
4370
|
+
CVE-2025-68155,2025-12-16T22:32:26Z,"@vitejs/plugin-rsc has an Arbitrary File Read via `/__vite_rsc_findSourceMapURL` Endpoint",@vitejs/plugin-rsc,0,0.5.8,,HIGH,CWE-22;CWE-73
|
|
4371
|
+
CVE-2025-68278,2025-12-18T18:45:41Z,"tinacms is vulnerable to arbitrary code execution",@tinacms/cli,0,2.0.4,,HIGH,CWE-94
|
|
4372
|
+
CVE-2025-68278,2025-12-18T18:45:41Z,"tinacms is vulnerable to arbitrary code execution",@tinacms/graphql,0,2.0.3,,HIGH,CWE-94
|
|
4373
|
+
CVE-2025-68278,2025-12-18T18:45:41Z,"tinacms is vulnerable to arbitrary code execution",tinacms,0,3.1.1,,HIGH,CWE-94
|
|
4374
|
+
CVE-2025-68429,2025-12-18T18:49:21Z,"Storybook manager bundle may expose environment variables during build",storybook,10.0.0,10.1.10,,HIGH,CWE-200;CWE-538;CWE-541
|
|
4375
|
+
CVE-2025-68429,2025-12-18T18:49:21Z,"Storybook manager bundle may expose environment variables during build",storybook,7.0.0,7.6.21,,HIGH,CWE-200;CWE-538;CWE-541
|
|
4376
|
+
CVE-2025-68429,2025-12-18T18:49:21Z,"Storybook manager bundle may expose environment variables during build",storybook,8.0.0,8.6.15,,HIGH,CWE-200;CWE-538;CWE-541
|
|
4377
|
+
CVE-2025-68429,2025-12-18T18:49:21Z,"Storybook manager bundle may expose environment variables during build",storybook,9.0.0,9.1.17,,HIGH,CWE-200;CWE-538;CWE-541
|
|
4378
|
+
CVE-2025-68457,2025-12-19T19:17:26Z,"Orejime has executable code in HTML attributes",orejime,0,2.3.2,,LOW,CWE-79
|
|
4356
4379
|
CVE-2025-7338,2025-07-17T21:01:54Z,"Multer vulnerable to Denial of Service via unhandled exception from malformed request",multer,1.4.4-lts.1,2.0.2,,HIGH,CWE-248
|
|
4357
4380
|
CVE-2025-7339,2025-07-17T21:17:19Z,"on-headers is vulnerable to http response header manipulation",on-headers,0,1.1.0,,LOW,CWE-241
|
|
4358
4381
|
CVE-2025-7783,2025-07-21T19:04:54Z,"form-data uses unsafe random function in form-data for choosing boundary",form-data,0,2.5.4,,CRITICAL,CWE-330
|
|
@@ -4386,6 +4409,7 @@ GHSA-22rr-f3p8-5gf8,2023-09-15T17:12:42Z,"Directus affected by VM2 sandbox escap
|
|
|
4386
4409
|
GHSA-23q2-5gf8-gjpp,2024-04-19T17:26:32Z,"Enabling Authentication does not close all logged in socket connections immediately ",uptime-kuma,0,1.23.12,,LOW,CWE-384
|
|
4387
4410
|
GHSA-23vw-mhv5-grv5,2020-09-03T15:48:43Z,"Denial of Service in @hapi/hapi",@hapi/hapi,0,18.4.1,,HIGH,
|
|
4388
4411
|
GHSA-23vw-mhv5-grv5,2020-09-03T15:48:43Z,"Denial of Service in @hapi/hapi",@hapi/hapi,19.0.0,19.1.1,,HIGH,
|
|
4412
|
+
GHSA-24v3-254g-jv85,2025-12-19T21:32:35Z,"Tuta Mail has DOM attribute and CSS injection in its Contact Viewer feature",@tutao/tutanota-utils,0,314.251111.0,,LOW,CWE-1021;CWE-79
|
|
4389
4413
|
GHSA-255r-pghp-r5wh,2020-09-03T17:05:34Z,"Malicious Package in hdeky",hdeky,0.0.0,,,CRITICAL,CWE-506
|
|
4390
4414
|
GHSA-2563-83p7-f34p,2020-09-02T20:24:41Z,"Malicious Package in requestt",requestt,0,,,CRITICAL,CWE-506
|
|
4391
4415
|
GHSA-25v4-mcx4-hh35,2020-09-04T17:28:28Z,"Cross-Site Scripting in atlasboard-atlassian-package","atlasboard-atlassian-package",0.0.0,,,HIGH,CWE-79
|
|
@@ -5297,6 +5321,7 @@ GHSA-vp93-gcx5-4w52,2020-09-11T21:21:19Z,"Cross-Site Scripting in swagger-ui",sw
|
|
|
5297
5321
|
GHSA-vpgc-7h78-gx8f,2020-09-04T18:05:14Z,"personnummer/js vulnerable to Improper Input Validation",personnummer,0,3.1.0,,LOW,
|
|
5298
5322
|
GHSA-vpj4-89q8-rh38,2020-09-03T18:16:59Z,"Cross-Site Scripting in bpmn-js-properties-panel",bpmn-js-properties-panel,0,0.31.0,,HIGH,CWE-79
|
|
5299
5323
|
GHSA-vpq5-4rc8-c222,2019-06-05T14:10:45Z,"Denial of Service in canvas",canvas,0,1.6.10,,MODERATE,
|
|
5324
|
+
GHSA-vr6p-vq2p-6j74,2025-12-15T22:00:17Z,"LikeC4 has RCE through vulnerable React and Next.js versions",likec4,0,,1.46.1,CRITICAL,CWE-502
|
|
5300
5325
|
GHSA-vrxj-4qhw-5vwq,2020-09-03T17:03:41Z,"Malicious Package in scryptys",scryptys,0.0.0,,,CRITICAL,CWE-506
|
|
5301
5326
|
GHSA-vv52-3mrp-455m,2020-09-03T15:53:36Z,"Malicious Package in m-backdoor",m-backdoor,0.0.0,,,CRITICAL,CWE-506
|
|
5302
5327
|
GHSA-vv7g-pjw9-4qj9,2020-09-03T17:03:56Z,"Malicious Package in scrytsy",scrytsy,0.0.0,,,CRITICAL,CWE-506
|
|
@@ -5403,6 +5428,7 @@ GHSA-x565-32qp-m3vf,2024-04-11T21:30:30Z,"phin may include sensitive headers in
|
|
|
5403
5428
|
GHSA-x6ch-c6rv-f7wh,2020-09-02T18:34:22Z,"Malicious Package in asymc",asymc,0,,,CRITICAL,CWE-506
|
|
5404
5429
|
GHSA-x6gq-467r-hwcc,2020-09-01T21:14:05Z,"Malicious Package in soket.js",soket.js,0,,,CRITICAL,CWE-506
|
|
5405
5430
|
GHSA-x6m6-5hrf-fh6r,2020-09-01T21:26:50Z,"Denial of Service in markdown-it-toc-and-anchor","markdown-it-toc-and-anchor",0,4.2.0,,HIGH,CWE-400
|
|
5431
|
+
GHSA-x732-6j76-qmhm,2025-12-16T21:22:45Z,"Better Auth's rou3 Dependency has Double-Slash Path Normalization which can Bypass disabledPaths Config and Rate Limits",better-auth,0,1.4.5,,HIGH,CWE-400;CWE-41
|
|
5406
5432
|
GHSA-x7rp-qj2h-ghgw,2025-11-14T20:50:36Z,"Flowise Fails to Invalidate Existing Sessions After Password Changes",flowise,0,3.0.10,,HIGH,CWE-613
|
|
5407
5433
|
GHSA-x87g-rgrh-r6g3,2020-09-03T17:07:15Z,"Malicious Package in rpc-websocket",rpc-websocket,0.7.7,,,CRITICAL,CWE-506
|
|
5408
5434
|
GHSA-x8m7-cv39-xmg9,2020-09-03T22:56:10Z,"Malicious Package in jq-sha3",jq-sha3,0.0.0,,,CRITICAL,CWE-506
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@openrewrite/recipes-nodejs",
|
|
3
|
-
"version": "0.37.0-
|
|
3
|
+
"version": "0.37.0-20251222-170441",
|
|
4
4
|
"license": "Moderne Source Available License",
|
|
5
5
|
"description": "OpenRewrite recipes for Node.js library migrations.",
|
|
6
6
|
"homepage": "https://github.com/moderneinc/rewrite-node",
|