@sveltejs/kit/.../kit@1.0.0-next.311 vulnerabilities

SvelteKit is the fastest way to build Svelte apps

  • latest version

    2.11.1

  • latest non vulnerable version

  • first published

    4 years ago

  • latest version published

    2 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the @sveltejs/kit package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • L
    Cross-site Scripting (XSS)

    @sveltejs/kit is a SvelteKit framework and CLI

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to the unsanitized input from the request URL that flows into end, where it is used to render an HTML page returned to the user. An attacker can execute scripts in the context of the user's browser by manipulating the input to the request URL.

    Note:

    This is only exploitable if the Vite development server is exposed to the network, which is not the default configuration.

    How to fix Cross-site Scripting (XSS)?

    Upgrade @sveltejs/kit to version 2.8.3 or higher.

    <2.8.3
    • L
    Cross-site Scripting (XSS)

    @sveltejs/kit is a SvelteKit framework and CLI

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the error.html template. An attacker can inject malicious content by exploiting unescaped placeholders in error messages that contain user-controlled input.

    Note:

    This is only exploitable if user-provided input is used in the Error message.

    How to fix Cross-site Scripting (XSS)?

    Upgrade @sveltejs/kit to version 2.8.3 or higher.

    <2.8.3
    • H
    Server-side Request Forgery (SSRF)

    @sveltejs/kit is a SvelteKit framework and CLI

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) by allowing malicious requests to be submitted from third-party domains, which can allow execution of operations within the context of the victim's session, and in extreme scenarios can lead to unauthorized access to users’ accounts.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade @sveltejs/kit to version 1.15.2 or higher.

    <1.15.2
    • H
    Cross-site Request Forgery (CSRF)

    @sveltejs/kit is a SvelteKit framework and CLI

    Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) by sending a JSON request with a different Content-Type header value, such as text/plain. This allows malicious requests to be submitted from third-party domains, which can allow execution of operations within the context of the victim's session, and in extreme scenarios can lead to unauthorized access to users’ accounts.

    How to fix Cross-site Request Forgery (CSRF)?

    Upgrade @sveltejs/kit to version 1.15.1 or higher.

    <1.15.1