Description
Affected versions of droppy are vulnerable to cross-site socket forgery. The package does not perform verification for cross-domain websocket requests, and as a result, an attacker can create a web page that opens up a websocket connection on behalf of the user visiting the page.
Recommendation
Update the droppy package to the latest compatible version. Followings are version details:
- Affected version(s): < 3.5.0
- Patched version(s): 3.5.0
References
Related Issues
- XSS due to lack of CSRF validation for replying/publishing - CVE-2020-15156
- matrix-js-sdk has insufficient validation when considering a room to be upgraded by another - CVE-2025-59160
- Astro's bypass of image proxy domain validation leads to SSRF and potential XSS - CVE-2025-59837
- Denial of Service in jquery - CVE-2016-10707
- Tags:
- npm
- droppy
Anything's wrong? Let us know Last updated on January 09, 2023