Description
If you’re running a vulnerable application on your computer and an attacker can trick you into visiting a malicious website, they could use DNS rebinding and CSRF attacks to read/write to vulnerable applications.
There is no evidence that suggests that this has been used in the wild.
Recommendation
Update the @fraction/oasis package to the latest compatible version. Followings are version details:
- Affected version(s): < 2.15.0
- Patched version(s): 2.15.0
References
Related Issues
- SillyTavern Web Interface Vulnerable DNS Rebinding - CVE-2025-59159
- XSS due to lack of CSRF validation for replying/publishing - CVE-2020-15156
- CSRF vulnerability in save-server - CVE-2020-15135
- Microsoft Playwright MCP Server vulnerable to DNS Rebinding Attack; Allows Attackers Access to All Server Tools - CVE-2025-9611
- Tags:
- npm
- @fraction/oasis
Anything's wrong? Let us know Last updated on January 09, 2023