highcharts@7.2.2 vulnerabilities

JavaScript charting framework

  • latest version

    12.1.2

  • latest non vulnerable version

  • first published

    10 years ago

  • latest version published

    25 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the highcharts package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Cross-site Scripting (XSS)

    highcharts is a JavaScript charting library based on SVG, with fallbacks to VML and canvas for old browsers.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The chart options structure was not systematically filtered for XSS vectors. The potential impact was that content from untrusted sources could execute code in the end user's browser.

    As a workaround, implementers who are not able to upgrade may apply DOMPurify recursively to the options structure to filter out malicious markup.

    How to fix Cross-site Scripting (XSS)?

    Upgrade highcharts to version 9.0.0 or higher.

    <9.0.0
    • M
    Prototype Pollution

    highcharts is a JavaScript charting library based on SVG, with fallbacks to VML and canvas for old browsers.

    Affected versions of this package are vulnerable to Prototype Pollution via the merge function. The function recursively merges the target object with the source object (or in case of just one object the function is equivalent to a deep copy). However, it does not properly check the keys being set, leading to prototype pollution.

    The impact depends on the application. In some cases, it is possible to achieve Denial of service (DoS), Remote Code Execution (or XSS) or Property Injection.

    How to fix Prototype Pollution?

    Upgrade highcharts to version 9.0.0 or higher.

    <9.0.0