[Aikido] Fix 5 security issues in lodash, js-yaml, @asyncapi/parser and 8 more#19
Conversation
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
There was a problem hiding this comment.
CVE-2025-64756 in glob - high severity
Glob matches files using patterns the shell uses. Starting in version 10.2.0 and prior to versions 10.5.0 and 11.1.0, the glob CLI contains a command injection vulnerability in its -c/--cmd option that allows arbitrary command execution when processing files with malicious names. When glob -c are used, matched filenames are passed to a shell with shell: true, enabling shell metacharacters in filenames to trigger command injection and achieve arbitrary code execution under the user or CI account privileges. This issue has been patched in versions 10.5.0 and 11.1.0.
Remediation Aikido suggests bumping this package to version 10.5.0 to resolve this issue
View details in Aikido Security
Upgrades multiple dependencies to address prototype pollution, YAML parsing, and AWS SDK vulnerabilities, mitigating potential RCE and DoS risks across libraries.
✅ Code not affected by breaking changes.
No breaking changes from either package upgrade affect this codebase.
js-yaml (3.14.1 => 4.1.1):
The package is only used as a transitive dependency through
@asyncapi/parser,@asyncapi/cli,@asyncapi/generator, and@apidevtools/json-schema-ref-parserNo direct imports or usage of
js-yamlfound in the source codeNo usage of deprecated methods like
safeLoad(),safeDump(),DEFAULT_SAFE_SCHEMA,DEFAULT_FULL_SCHEMA, orSchema.create()found in the codebaseThe breaking changes only affect code that directly uses js-yaml APIs, which this codebase does not
@smithy/config-resolver (3.0.12 => 4.4.0):
The package is only used as a transitive dependency through AWS SDK packages
No direct imports or usage of
@smithy/config-resolverfound in the source codeThe project's
package.jsondoes not specify a Node.js engine requirement, and the breaking change (dropping Node.js 16 support) only matters if the project is running on Node.js 16, which is not enforced or indicated in the codebaseSince there's no direct usage and no explicit Node.js 16 constraint, this upgrade poses no risk
Both packages are used only as transitive dependencies with no direct code interaction, making the upgrades safe for this codebase.
✅ 5 CVEs resolved by this upgrade
This PR will resolve the following CVEs: