Insertion of Sensitive Information into Externally-Accessible File or Directory Affecting storybook package, versions >=7.0.0 <7.6.21>=8.0.0-alpha.0 <8.6.15>=9.0.0-alpha.0 <9.1.17>=10.0.0-beta.0 <10.1.10>=10.2.0-alpha.0 <10.2.0-alpha.7


Severity

Recommended
0.0
low
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (16th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-STORYBOOK-14534871
  • published19 Dec 2025
  • disclosed17 Dec 2025
  • creditMatt G

Introduced: 17 Dec 2025

CVE-2025-68429  (opens in a new tab)
CWE-538  (opens in a new tab)

How to fix?

Upgrade storybook to version 7.6.21, 8.6.15, 9.1.17, 10.1.10, 10.2.0-alpha.7 or higher.

Overview

storybook is a frontend workshop for building UI components and pages in isolation.

Affected versions of this package are vulnerable to Insertion of Sensitive Information into Externally-Accessible File or Directory via the storybook build command. An attacker can access sensitive environment variables by viewing the bundled source code after the build artifacts are published to the web. This is only exploitable if the build is performed in a directory containing a .env file and the resulting build is published to the web.

CVSS Base Scores

version 4.0
version 3.1