Vulnerabilities/

@urql/next Cross-site Scripting vulnerability

Severity:
High

Description

The @urql/next package is vulnerable to XSS. To exploit this an attacker would need to ensure that the response returns html tags and that the web-application is using streamed responses (non-RSC). This vulnerability is due to improper escaping of html-like characters in the response-stream.

To fix this vulnerability upgrade to version 1.1.1

Recommendation

Update the @urql/next package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
@urql/next
Anything's wrong? Let us know Last updated on January 30, 2024

This issue is available in SmartScanner Professional

See Pricing