highcharts@7.0.2

JavaScript charting framework

  • latest version

    12.6.0

  • latest non vulnerable version

  • first published

    11 years ago

  • latest version published

    12 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the highcharts package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Cross-site Scripting (XSS)

    highcharts is a JavaScript charting library based on SVG, with fallbacks to VML and canvas for old browsers.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The chart options structure was not systematically filtered for XSS vectors. The potential impact was that content from untrusted sources could execute code in the end user's browser.

    As a workaround, implementers who are not able to upgrade may apply DOMPurify recursively to the options structure to filter out malicious markup.

    How to fix Cross-site Scripting (XSS)?

    Upgrade highcharts to version 9.0.0 or higher.

    <9.0.0
    • H
    Cross-site Scripting (XSS)

    highcharts is a JavaScript charting library based on SVG, with fallbacks to VML and canvas for old browsers.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The <a> tag for text formats is translated into a tspan with onclick, allowing for script injection.

    How to fix Cross-site Scripting (XSS)?

    Upgrade highcharts to version 7.2.2, 8.1.1 or higher.

    <7.2.2>=8.0.0 <8.1.1