Skip to content

Conversation

@nextcloud-command
Copy link
Contributor

@nextcloud-command nextcloud-command commented Nov 30, 2025

Audit report

This audit fix resolves 25 of the total 25 vulnerabilities found in your project.

Updated dependencies

Fixed vulnerabilities

@cypress/request #

  • Caused by vulnerable dependency:
  • Affected versions: <=3.0.9
  • Package usage:
    • node_modules/@cypress/request

@linusborg/vue-simple-portal #

  • Caused by vulnerable dependency:
  • Affected versions: *
  • Package usage:
    • node_modules/@linusborg/vue-simple-portal

@nextcloud/dialogs #

  • Caused by vulnerable dependency:
  • Affected versions: 4.2.0-beta.1 - 6.4.2
  • Package usage:
    • node_modules/@nextcloud/dialogs

@nextcloud/vue #

@nextcloud/vue-select #

  • Caused by vulnerable dependency:
  • Affected versions: *
  • Package usage:
    • node_modules/@nextcloud/vue-select

@nextcloud/webpack-vue-config #

@vue/component-compiler-utils #

  • Caused by vulnerable dependency:
  • Affected versions: *
  • Package usage:
    • node_modules/@vue/component-compiler-utils

body-parser #

  • Caused by vulnerable dependency:
  • Affected versions: <=1.20.3 || 2.0.0-beta.1 - 2.0.2
  • Package usage:
    • node_modules/body-parser

browserify-sign #

  • Caused by vulnerable dependency:
  • Affected versions: >=2.4.0
  • Package usage:
    • node_modules/browserify-sign

create-ecdh #

  • Caused by vulnerable dependency:
  • Affected versions: *
  • Package usage:
    • node_modules/create-ecdh

crypto-browserify #

  • Caused by vulnerable dependency:
  • Affected versions: >=3.4.0
  • Package usage:
    • node_modules/crypto-browserify

elliptic #

  • Elliptic Uses a Cryptographic Primitive with a Risky Implementation
  • Severity: low (CVSS 5.6)
  • Reference: GHSA-848j-6mx2-7j84
  • Affected versions: *
  • Package usage:
    • node_modules/elliptic

express #

  • Caused by vulnerable dependency:
  • Affected versions: 2.5.8 - 2.5.11 || 3.2.1 - 3.2.3 || 4.0.0-rc1 - 4.21.2 || 5.0.0-alpha.1 - 5.0.1
  • Package usage:
    • node_modules/express

floating-vue #

  • Caused by vulnerable dependency:
  • Affected versions: <=1.0.0-beta.19
  • Package usage:
    • node_modules/floating-vue

mdast-util-to-hast #

  • mdast-util-to-hast has unsanitized class attribute
  • Severity: moderate
  • Reference: GHSA-4fh9-h7wg-q85m
  • Affected versions: 13.0.0 - 13.2.0
  • Package usage:
    • node_modules/mdast-util-to-hast

node-forge #

  • node-forge has ASN.1 Unbounded Recursion
  • Severity: high
  • Reference: GHSA-554w-wpv2-vw27
  • Affected versions: <=1.3.1
  • Package usage:
    • node_modules/node-forge

node-polyfill-webpack-plugin #

  • Caused by vulnerable dependency:
  • Affected versions: <=4.0.0
  • Package usage:
    • node_modules/node-polyfill-webpack-plugin

postcss #

  • PostCSS line return parsing error
  • Severity: moderate (CVSS 5.3)
  • Reference: GHSA-7fh5-64p2-3v2j
  • Affected versions: <8.4.31
  • Package usage:
    • node_modules/@vue/component-compiler-utils/node_modules/postcss

qs #

  • qs's arrayLimit bypass in its bracket notation allows DoS via memory exhaustion
  • Severity: high (CVSS 7.5)
  • Reference: GHSA-6rw7-vpxm-498p
  • Affected versions: <6.14.1
  • Package usage:
    • node_modules/qs

vue #

  • ReDoS vulnerability in vue package that is exploitable through inefficient regex evaluation in the parseHTML function
  • Severity: low (CVSS 3.7)
  • Reference: GHSA-5j4c-8p2g-v4jx
  • Affected versions: 2.0.0-alpha.1 - 2.7.16
  • Package usage:
    • node_modules/vue

vue-frag #

  • Caused by vulnerable dependency:
  • Affected versions: >=1.3.1
  • Package usage:
    • node_modules/vue-frag

vue-loader #

  • Caused by vulnerable dependency:
  • Affected versions: 15.0.0-beta.1 - 15.11.1
  • Package usage:
    • node_modules/vue-loader

vue-resize #

  • Caused by vulnerable dependency:
  • Affected versions: 0.4.0 - 1.0.1
  • Package usage:
    • node_modules/vue-resize

vue-template-compiler #

  • vue-template-compiler vulnerable to client-side Cross-Site Scripting (XSS)
  • Severity: moderate (CVSS 4.2)
  • Reference: GHSA-g3ch-rx76-35fx
  • Affected versions: >=2.0.0
  • Package usage:
    • node_modules/vue-template-compiler

vue2-datepicker #

  • Caused by vulnerable dependency:
  • Affected versions: <=1.9.8 || 3.0.2 - 3.11.1
  • Package usage:
    • node_modules/vue2-datepicker

@nextcloud-command nextcloud-command added the 3. to review Ready to be reviewed label Nov 30, 2025
@nextcloud-command nextcloud-command added the dependencies Pull requests that update a dependency file label Nov 30, 2025
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable32-fix-npm-audit branch 2 times, most recently from 482f36e to 2f484ea Compare December 14, 2025 03:34
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable32-fix-npm-audit branch from 2f484ea to 86cf04a Compare December 21, 2025 03:34
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable32-fix-npm-audit branch from 86cf04a to 38bd10a Compare December 28, 2025 03:34
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable32-fix-npm-audit branch from 38bd10a to 0effddd Compare January 4, 2026 03:37
Signed-off-by: GitHub <noreply@github.com>
@nextcloud-command nextcloud-command force-pushed the automated/noid/stable32-fix-npm-audit branch from 0effddd to 875e6c9 Compare January 11, 2026 03:52
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

3. to review Ready to be reviewed dependencies Pull requests that update a dependency file

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants