xmlhttprequest and xmlhttprequest-ssl vulnerable to Arbitrary Code Injection
- Severity:
- High
Description
This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False
on xhr.open
), malicious user input flowing into xhr.send
could result in arbitrary code being injected and run.
Recommendation
Update the xmlhttprequest-ssl
package to the latest compatible version. Followings are version details:
- Affected version(s): < 1.6.2
- Patched version(s): 1.6.2
References
Related Issues
- Regular Expression Denial of Service (ReDoS) in lodash (GHSA-29mw-wpgm-hmr9) - CVE-2020-28500
- CKEditor 5 cross-site scripting (XSS) vulnerability in the clipboard package - CVE-2025-58064
- Payload's SQLite adapter Session Fixation vulnerability (GHSA-26rv-h2hf-3fw4) - CVE-2025-4644
- http-proxy-middleware can call writeBody twice because "else if" is not used - CVE-2025-32996
- Tags:
- npm
- xmlhttprequest-ssl
Anything's wrong? Let us know Last updated on November 29, 2023