Description
Affected versions of pouchdb
do not properly sandbox the code execution engine which executes the map/reduce functions for temporary views and design documents. Under certain circumstances, an attacker could uses this to run arbitrary code on the server.
Recommendation
Update the pouchdb
package to the latest compatible version. Followings are version details:
- Affected version(s): < 6.0.5
- Patched version(s): 6.0.5
References
Related Issues
- tRPC 11 WebSocket DoS Vulnerability - CVE-2025-43855
- DocsGPT Allows Remote Code Execution - CVE-2025-0868
- Signature Malleabillity in elliptic - CVE-2020-13822
- Joplin Vulnerable to Code Injection - CVE-2022-23340
- Tags:
- npm
- pouchdb
Anything's wrong? Let us know Last updated on January 09, 2023