-
Notifications
You must be signed in to change notification settings - Fork 0
Closed
Labels
Description
Important
CLOSE THE ISSUE ONLY IF YOU PLAN TO DEPLOY THE FIX BEFORE THE DEADLINE IN THE TITLE.
DO NOT MANUALLY MODIFY THE ISSUE TITLE OR TEXT BODY.
npm-fast-xml-parser >= 5.0.9, <= 5.3.3 CODE_REPOSITORY/commercelayer-cli-plugin-microstore CVE-2026-25128 HIGH remediate by: 2026-03-13T22:15:20.604Z
npm-lodash-es >= 4.0.0, <= 4.17.22 CODE_REPOSITORY/commercelayer-cli-plugin-microstore CVE-2025-13465 MEDIUM remediate by: 2026-03-23T06:15:19.249Z
npm-lodash >= 4.0.0, <= 4.17.22 CODE_REPOSITORY/commercelayer-cli-plugin-microstore CVE-2025-13465 MEDIUM remediate by: 2026-03-23T06:15:19.249Z
npm-undici < 6.23.0 CODE_REPOSITORY/commercelayer-cli-plugin-microstore CVE-2026-22036 MEDIUM remediate by: 2026-03-23T23:28:22.790Z
npm-undici >= 7.0.0, < 7.18.2 CODE_REPOSITORY/commercelayer-cli-plugin-microstore CVE-2026-22036 MEDIUM remediate by: 2026-03-23T23:28:22.790Z
npm-minimatch >= 5.0.0, < 5.1.7 CODE_REPOSITORY/commercelayer-cli-plugin-microstore CVE-2026-26996 HIGH remediate by: 2026-03-27T08:50:05.811Z
npm-minimatch < 3.1.3 CODE_REPOSITORY/commercelayer-cli-plugin-microstore CVE-2026-26996 HIGH remediate by: 2026-03-27T08:50:05.811Z
FIXED npm-minimatch >= 9.0.0, < 9.0.6 CVE-2026-26996 HIGH
npm-minimatch >= 9.0.0, < 9.0.6 CODE_REPOSITORY/commercelayer-cli-plugin-microstore CVE-2026-26996 HIGH remediate by: 2026-03-27T08:50:05.811Z
npm-minimatch >= 5.0.0, < 5.1.8 CODE_REPOSITORY/commercelayer-cli-plugin-microstore CVE-2026-27904 HIGH remediate by: 2026-03-30T06:15:08.603Z
npm-minimatch >= 5.0.0, < 5.1.8 CODE_REPOSITORY/commercelayer-cli-plugin-microstore CVE-2026-27903 HIGH remediate by: 2026-03-30T06:15:08.603Z
npm-diff >= 5.0.0, < 5.2.2 CODE_REPOSITORY/commercelayer-cli-plugin-microstore CVE-2026-24001 LOW remediate by: 2026-04-21T22:15:39.536Z
npm-ajv < 6.14.0 CODE_REPOSITORY/commercelayer-cli-plugin-microstore CVE-2025-69873 MEDIUM remediate by: 2026-04-23T06:15:03.493Z
Related URLs
- https://nvd.nist.gov/vuln/detail/CVE-2025-69873
- https://github.com/EthanKim88/ethan-cve-disclosures/blob/main/CVE-2025-69873-ajv-ReDoS.md
- fix(pattern): use configured RegExp engine with $data keyword to mitigate ReDoS attacks (CVE-2025-69873) ajv-validator/ajv#2586
- ajv-validator/ajv@720a23f
- https://github.com/ajv-validator/ajv/releases/tag/v8.18.0
- fix(security): backport CVE-2025-69873 - wrap $data pattern in try/catch ajv-validator/ajv#2588
- https://github.com/ajv-validator/ajv/releases/tag/v6.14.0
- GHSA-2g4f-4pwh-qvx6
Reactions are currently unavailable