|
1 | 1 | id: osv-npm |
2 | 2 | title: OSV vulnerabilities for npm |
3 | 3 | description: Auto-generated by osv-rulegen 0.3.0 from https://osv.dev data dump for the npm ecosystem. |
4 | | -date: "2026-05-08T17:07:34Z" |
| 4 | +date: "2026-05-08T18:07:27Z" |
5 | 5 | rules: |
6 | 6 | - id: GHSA-2234-fmw7-43wr |
7 | 7 | aliases: |
@@ -9179,6 +9179,14 @@ rules: |
9179 | 9179 | version: vers:npm/>=0.3.0|<=0.11.0 |
9180 | 9180 | severity: 6.5 |
9181 | 9181 | reason: files.photo.gallery command injection |
| 9182 | + - id: GHSA-5wm8-gmm8-39j9 |
| 9183 | + aliases: |
| 9184 | + - CVE-2026-44665 |
| 9185 | + match: |
| 9186 | + - purl: pkg:npm/fast-xml-builder |
| 9187 | + version: vers:npm/<1.1.7 |
| 9188 | + severity: 8.7 |
| 9189 | + reason: fast-xml-builder allows attribute values with unwanted quotes to bypass malicious or unwanted attributes |
9182 | 9190 | - id: GHSA-5wmg-9cvh-qw25 |
9183 | 9191 | aliases: |
9184 | 9192 | - CVE-2024-51752 |
@@ -14946,6 +14954,12 @@ rules: |
14946 | 14954 | version: vers:npm/<=3.0.0 |
14947 | 14955 | severity: 8.9 |
14948 | 14956 | reason: Prototype Pollution Vulnerability in parse-git-config |
| 14957 | + - id: GHSA-8g7g-hmwm-6rv2 |
| 14958 | + match: |
| 14959 | + - purl: pkg:npm/n8n-mcp |
| 14960 | + version: vers:npm/<2.50.1 |
| 14961 | + severity: 8.3 |
| 14962 | + reason: n8n-mcp affected by path traversal, redirect-following SSRF, and telemetry payload exposure |
14949 | 14963 | - id: GHSA-8g7p-74h8-hg48 |
14950 | 14964 | aliases: |
14951 | 14965 | - CVE-2018-3739 |
@@ -19887,6 +19901,14 @@ rules: |
19887 | 19901 | version: vers:npm/>=0.4.0|<0.5.3 |
19888 | 19902 | severity: 7.5 |
19889 | 19903 | reason: Fastly Compute@Edge JS Runtime has fixed random number seed during compilation |
| 19904 | + - id: GHSA-cmrh-wvq6-wm9r |
| 19905 | + aliases: |
| 19906 | + - CVE-2026-44694 |
| 19907 | + match: |
| 19908 | + - purl: pkg:npm/n8n-mcp |
| 19909 | + version: vers:npm/>=2.18.7|<2.50.2 |
| 19910 | + severity: 7.2 |
| 19911 | + reason: n8n-mcp webhook and API client paths has an authenticated SSRF |
19890 | 19912 | - id: GHSA-cp47-r258-q626 |
19891 | 19913 | match: |
19892 | 19914 | - purl: pkg:npm/vega |
@@ -23696,6 +23718,14 @@ rules: |
23696 | 23718 | version: vers:npm/<1.3.0 |
23697 | 23719 | severity: 9.6 |
23698 | 23720 | reason: Cross-site Scripting (XSS) in Eclipse Theia |
| 23721 | + - id: GHSA-gcmm-c94j-j47x |
| 23722 | + aliases: |
| 23723 | + - CVE-2026-7738 |
| 23724 | + match: |
| 23725 | + - purl: pkg:npm/%40puchunjie/doc-tools-mcp |
| 23726 | + version: vers:npm/<=1.0.18 |
| 23727 | + severity: 2.1 |
| 23728 | + reason: '@puchunjie/doc-tools-mcp has a Path Traversal Issue' |
23699 | 23729 | - id: GHSA-gcv8-gh4r-25x6 |
23700 | 23730 | aliases: |
23701 | 23731 | - CVE-2022-0613 |
@@ -35646,6 +35676,14 @@ rules: |
35646 | 35676 | version: vers:npm/<2026.3.28 |
35647 | 35677 | severity: 2.3 |
35648 | 35678 | reason: OpenClaw affected by SSRF via unguarded image download in fal provider |
| 35679 | + - id: GHSA-qxhc-wx3p-2wmg |
| 35680 | + aliases: |
| 35681 | + - CVE-2026-7768 |
| 35682 | + match: |
| 35683 | + - purl: pkg:npm/%40fastify/accepts-serializer |
| 35684 | + version: vers:npm/<6.0.4 |
| 35685 | + severity: 7.5 |
| 35686 | + reason: '@fastify/accepts-serializer Vulnerable to Denial of Service via Unbounded Accept Header Cache Growth' |
35649 | 35687 | - id: GHSA-qxrj-hx23-xp82 |
35650 | 35688 | aliases: |
35651 | 35689 | - CVE-2023-49803 |
@@ -1154409,6 +1154447,7 @@ rules: |
1154409 | 1154447 | - id: MAL-2026-3397 |
1154410 | 1154448 | match: |
1154411 | 1154449 | - purl: pkg:npm/tecken@0.1.2 |
| 1154450 | + - purl: pkg:npm/tecken@0.1.13 |
1154412 | 1154451 | severity: 10 |
1154413 | 1154452 | reason: Malicious code in tecken (npm) |
1154414 | 1154453 | - id: MAL-2026-34 |
|
0 commit comments