express-gateway@1.2.0 vulnerabilities

A microservices API gateway built on top of ExpressJS

Direct Vulnerabilities

Known vulnerabilities in the express-gateway package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Cross-site Scripting (XSS)

express-gateway is an A microservices API gateway built on top of ExpressJS

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to a lack of input validation and output sanitization when handling user and application creation (POST /) and update (PUT /:id) requests.. An attacker can inject and execute arbitrary scripts in the context of a user's browser by submitting crafted input to the affected endpoint.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for express-gateway.

*
  • M
Cross-site Scripting (XSS)

express-gateway is an A microservices API gateway built on top of ExpressJS

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the /users/:id and /apps/:id routes, where unsanitized user-supplied input (req.params.id) is directly embedded into the server's response without proper HTML escaping. An attacker can inject and execute arbitrary scripts in the context of a user's browser by submitting crafted input to the affected endpoint.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for express-gateway.

*