2.11.1
4 years ago
12 hours ago
Known vulnerabilities in the @sveltejs/kit package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
@sveltejs/kit is a SvelteKit framework and CLI Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to the unsanitized input from the Note: This is only exploitable if the Vite development server is exposed to the network, which is not the default configuration. How to fix Cross-site Scripting (XSS)? Upgrade | <2.8.3 |
@sveltejs/kit is a SvelteKit framework and CLI Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the Note: This is only exploitable if user-provided input is used in the How to fix Cross-site Scripting (XSS)? Upgrade | <2.8.3 |
@sveltejs/kit is a SvelteKit framework and CLI Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) by allowing malicious requests to be submitted from third-party domains, which can allow execution of operations within the context of the victim's session, and in extreme scenarios can lead to unauthorized access to users’ accounts. How to fix Server-side Request Forgery (SSRF)? Upgrade | <1.15.2 |
@sveltejs/kit is a SvelteKit framework and CLI Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) by sending a JSON request with a different How to fix Cross-site Request Forgery (CSRF)? Upgrade | <1.15.1 |