[Aikido] Fix 11 security issues in h3, hono, socket.io-parser and 3 more#427
[Aikido] Fix 11 security issues in h3, hono, socket.io-parser and 3 more#427aikido-autofix[bot] wants to merge 1 commit intomainfrom
Conversation
PR SummaryMedium Risk Overview Also updates Written by Cursor Bugbot for commit be0e074. This will update automatically on new commits. Configure here. |
|
There was a problem hiding this comment.
Cursor Bugbot has reviewed your changes and found 1 potential issue.
Bugbot Autofix is OFF. To automatically fix reported issues with cloud agents, enable autofix in the Cursor dashboard.
| "react": ">=18.3.1", | ||
| "react-dom": ">=18.3.1", | ||
| "thirdweb": "^5.68.0", | ||
| "thirdweb": "5.93.5-nightly-b51157c0ff17e9535029fc8790cfa8538d1c995f-20250326000337", |
There was a problem hiding this comment.
Nightly thirdweb build pinned in devDependencies
Medium Severity
The thirdweb devDependency was changed from a stable semver range ("^5.68.0") to a specific nightly pre-release build ("5.93.5-nightly-..."). This is unrelated to any of the 11 CVEs listed in the PR description and appears to be a testing artifact that was accidentally included. A nightly build is inherently unstable and may contain unfinished features or bugs. It also conflicts with the stable peerDependency range "^5.72.0", creating an inconsistency between what the library is tested against and what end users will install.


Upgrade dependencies to fix critical SSE injection and auth bypass vulnerabilities, plus high-severity DoS and memory exhaustion issues.
✅ 11 CVEs resolved by this upgrade, including 2 critical 🚨 CVEs
This PR will resolve the following CVEs:
\r) characters in data and comment fields, allowing attackers to inject arbitrary SSE events, spoof event types, and split single push() calls into multiple browser-parsed events. This bypasses a prior fix that only addressed newline (\n) injection.parseBody({ dot: true })where specially crafted form field names like__proto__.xcreate objects with__proto__properties, potentially enabling prototype pollution if merged unsafely into other objects.basicAuthandbearerAuthmiddlewares used non-timing-safe string comparison for hash validation, potentially allowing timing-based analysis attacks. The vulnerability has been fixed by implementing constant-time comparison to prevent early termination.🔗 Related Tasks