Description
Affected versions of droppy are vulnerable to cross-site socket forgery. The package does not perform verification for cross-domain websocket requests, and as a result, an attacker can create a web page that opens up a websocket connection on behalf of the user visiting the page.
Recommendation
Update the droppy package to the latest compatible version. Followings are version details:
- Affected version(s): < 3.5.0
- Patched version(s): 3.5.0
References
Related Issues
- XSS due to lack of CSRF validation for replying/publishing - CVE-2020-15156
- Improper Validation and Sanitization in url-parse - CVE-2020-8124
- React Router has CSRF issue in Action/Server Action Request Processing - CVE-2026-22030
- Improper Validation of Query Parameters in Auth0 Next.js SDK - CVE-2025-67716
- Tags:
- npm
- droppy
Anything's wrong? Let us know Last updated on January 09, 2023