Description
The @urql/next
package is vulnerable to XSS. To exploit this an attacker would need to ensure that the response returns html
tags and that the web-application is using streamed responses (non-RSC). This vulnerability is due to improper escaping of html-like characters in the response-stream.
To fix this vulnerability upgrade to version 1.1.1
Recommendation
Update the @urql/next
package to the latest compatible version. Followings are version details:
- Affected version(s): < 1.1.1
- Patched version(s): 1.1.1
References
Related Issues
- counterpart vulnerable to prototype pollution - CVE-2025-57354
- Parse Server has an OAuth login vulnerability - CVE-2025-30168
- Use of Insufficiently Random Values in undici - CVE-2025-22150
- SummerNote Cross Site Scripting Vulnerability - CVE-2024-37629
- Tags:
- npm
- @urql/next
Anything's wrong? Let us know Last updated on January 30, 2024