-
-
Notifications
You must be signed in to change notification settings - Fork 3.2k
chore(deps): update dependency @sveltejs/kit to v2.20.6 [security] #9054
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
View your CI Pipeline Execution ↗ for commit 3b61f44.
☁️ Nx Cloud last updated this comment at |
Sizes for commit 3b61f44:
|
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #9054 +/- ##
=======================================
Coverage 44.58% 44.58%
=======================================
Files 203 203
Lines 8104 8104
Branches 1811 1810 -1
=======================================
Hits 3613 3613
Misses 4059 4059
Partials 432 432 🚀 New features to boost your workflow:
|
9833846
to
3b61f44
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
2.20.5
->2.20.6
Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
GitHub Vulnerability Alerts
CVE-2025-32388
Summary
Unsanitized search param names cause XSS vulnerability. You are affected if you iterate over all entries of
event.url.searchParams
inside a serverload
function. Attackers can exploit it by crafting a malicious URL and getting a user to click a link with said URL.Details
SvelteKit tracks which parameters in
event.url.searchParams
are read inside serverload
functions. If the application iterates over the these parameters, theuses.search_params
array included in the boot script (embedded in the server-rendered HTML) will have any search param name included in unsanitized form.packages/kit/src/runtime/server/utils.js:150
has thestringify_uses(node)
function which prints these out.Reproduction
In a
+page.server.js
or+layout.server.js
:If a user visits the page in question via a link containing
?</script/><script>window.pwned%3D1</script/>
, the</script>
will be included verbatim in the payload, causing the embedded script to be executed.It is not necessary to return the parameter value from
load
or render it in the page, only to read it (which causes it to be tracked as a dependency) whileload
is running.Impact
Any application that iterates over all values in
event.url.searchParams
in aload
function in+page.server.js
or+layout.server.js
(directly or indirectly) is vulnerable to XSS.Release Notes
sveltejs/kit (@sveltejs/kit)
v2.20.6
Compare Source
Patch Changes
d3300c6a67908590266c363dba7b0835d9a194cf
)Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.