Description
Versions of validator prior to 2.0.0 contained an xss filter method that is affected by several filter bypasses. This may result in a cross-site scripting vulnerability.
Recommendation
Update the validator package to the latest compatible version. Followings are version details:
- Affected version(s): < 2.0.0
- Patched version(s): 2.0.0
References
- GHSA-79mx-88w7-8f7q
- www.npmjs.com
- www.openwall.com
- www.securityfocus.com
- CVE-2014-9772
- CWE-79
- CAPEC-310
- OWASP 2021-A3
- OWASP 2021-A6
Related Issues
- Parse Server has a stored XSS filter bypass via Content-Type MIME parameter and missing XML extension blocklist entries - CVE-2026-32728
- Vega Cross-Site Scripting (XSS) via event filter when not using CSP mode expressionInterpeter (GHSA-rcw3-wmx7-cphr) - CVE-2025-26619
- Vite XSS vulnerability in `server.transformIndexHtml` via URL payload - CVE-2023-49293
- @hono/node-server has authorization bypass for protected static paths via encoded slashes in Serve Static Middleware - CVE-2026-29087
- Tags:
- npm
- validator
Anything's wrong? Let us know Last updated on January 09, 2023