[Aikido] Fix 11 security issues in hono, socket.io-parser, h3 and 3 more#421
[Aikido] Fix 11 security issues in hono, socket.io-parser, h3 and 3 more#421aikido-autofix[bot] wants to merge 1 commit intomainfrom
Conversation
|
PR SummaryMedium Risk Overview In Written by Cursor Bugbot for commit 3c50637. This will update automatically on new commits. Configure here. |
There was a problem hiding this comment.
Cursor Bugbot has reviewed your changes and found 1 potential issue.
Bugbot Autofix is OFF. To automatically fix reported issues with cloud agents, enable autofix in the Cursor dashboard.
| "react": ">=18.3.1", | ||
| "react-dom": ">=18.3.1", | ||
| "thirdweb": "^5.68.0", | ||
| "thirdweb": "5.93.5-nightly-b51157c0ff17e9535029fc8790cfa8538d1c995f-20250326000337", |
There was a problem hiding this comment.
Nightly thirdweb build accidentally committed in security PR
Medium Severity
The thirdweb devDependency was changed from stable "^5.68.0" to a nightly build "5.93.5-nightly-b51157c0ff17e9535029fc8790cfa8538d1c995f-20250326000337". This change is unrelated to any of the 11 CVEs being fixed in this PR — the project's viem is already at 2.45.1+, well above the 2.21.49 fix for the viem CVE. Nightly builds are inherently unstable and can be unpublished from npm at any time, which would break reproducible installs for all contributors.


Upgrade dependencies to fix critical authorization bypass in Hono, memory exhaustion DoS in Socket.IO, SSE injection in h3, and DoS vulnerabilities in Axios and related packages.
✅ 11 CVEs resolved by this upgrade, including 1 critical 🚨 CVE
This PR will resolve the following CVEs:
parseBody({ dot: true })where specially crafted form field names like__proto__.xcreate objects with__proto__properties, potentially enabling prototype pollution if merged unsafely into other objects.basicAuthandbearerAuthmiddlewares used non-timing-safe string comparison for hash validation, potentially allowing timing-based analysis attacks. The vulnerability has been fixed by implementing constant-time comparison to prevent early termination.\r) characters in data and comment fields, allowing attackers to inject arbitrary SSE events, spoof event types, and split single push() calls into multiple browser-parsed events. This bypasses a prior fix that only addressed newline (\n) injection.🔗 Related Tasks