Description
Manifest employs a weak password hashing implementation that uses SHA3 without a salt. This exposes user passwords to a higher risk of being cracked if an attacker gains access to the database.
Recommendation
Update the manifest
package to the latest compatible version. Followings are version details:
- Affected version(s): < 4.9.2
- Patched version(s): 4.9.2
References
Related Issues
- mpregular vulnerable to prototype pollution - CVE-2025-57323
- DOMPurify allows Cross-site Scripting (XSS) - CVE-2025-26791
- lite-server vulnerable to Denial of Service - CVE-2022-25940
- Regular Expression Denial of Service (ReDoS) - Vulnerability
- Tags:
- npm
- manifest
Anything's wrong? Let us know Last updated on March 04, 2025