Skip to content

chore(release): version packages#51

Merged
muneebs merged 1 commit intomainfrom
changeset-release/main
Apr 21, 2026
Merged

chore(release): version packages#51
muneebs merged 1 commit intomainfrom
changeset-release/main

Conversation

@github-actions
Copy link
Copy Markdown
Contributor

@github-actions github-actions Bot commented Apr 21, 2026

This PR was opened by the Changesets release GitHub action. When you're ready to do a release, you can merge this and the packages will be published to npm automatically. If you're not ready to do a release yet, that's fine, whenever you add more changesets to main, this PR will be updated.

Releases

@csrf-armor/core@1.2.3

Patch Changes

  • #52 440e0af Thanks @muneebs! - chore(deps): patch transitive dev dependency security advisories

    Bumps pnpm overrides for vite (^6.4.1^6.4.2) and unhead (>=2.1.11>=2.1.13) to pull in patched versions. These are dev/build-time dependencies only — no runtime behavior or published API changes.

    Addresses:

    • GHSA: Vite arbitrary file read via dev server WebSocket (high, <=6.4.1)
    • GHSA: Vite path traversal in optimized deps .map handling (medium, <=6.4.1)
    • GHSA: Unhead hasDangerousProtocol() bypass via leading-zero padded HTML entities in useHeadSafe() (medium, <2.1.13)

@csrf-armor/express@1.2.3

Patch Changes

  • #52 440e0af Thanks @muneebs! - chore(deps): patch transitive dev dependency security advisories

    Bumps pnpm overrides for vite (^6.4.1^6.4.2) and unhead (>=2.1.11>=2.1.13) to pull in patched versions. These are dev/build-time dependencies only — no runtime behavior or published API changes.

    Addresses:

    • GHSA: Vite arbitrary file read via dev server WebSocket (high, <=6.4.1)
    • GHSA: Vite path traversal in optimized deps .map handling (medium, <=6.4.1)
    • GHSA: Unhead hasDangerousProtocol() bypass via leading-zero padded HTML entities in useHeadSafe() (medium, <2.1.13)
  • Updated dependencies [440e0af]:

    • @csrf-armor/core@1.2.3

@csrf-armor/nextjs@1.4.3

Patch Changes

  • #50 7d4adeb Thanks @muneebs! - fix(client): preserve headers when csrfFetch is called with a Request object

    csrfFetch previously only read headers from the init argument, so when it was called with a full Request object (e.g. csrfFetch(new Request(url, { headers }))), the Request's headers were stripped. It now merges headers from the Request, then the init argument, then the CSRF headers (CSRF headers always take precedence), making csrfFetch a drop-in replacement for fetch.

    Fixes Bug: csrfFetch strips headers when the first argument is a Request #49

  • #52 440e0af Thanks @muneebs! - chore(deps): patch transitive dev dependency security advisories

    Bumps pnpm overrides for vite (^6.4.1^6.4.2) and unhead (>=2.1.11>=2.1.13) to pull in patched versions. These are dev/build-time dependencies only — no runtime behavior or published API changes.

    Addresses:

    • GHSA: Vite arbitrary file read via dev server WebSocket (high, <=6.4.1)
    • GHSA: Vite path traversal in optimized deps .map handling (medium, <=6.4.1)
    • GHSA: Unhead hasDangerousProtocol() bypass via leading-zero padded HTML entities in useHeadSafe() (medium, <2.1.13)
  • Updated dependencies [440e0af]:

    • @csrf-armor/core@1.2.3

@csrf-armor/nuxt@1.1.2

Patch Changes

  • #50 7d4adeb Thanks @muneebs! - fix(client): preserve headers when csrfFetch is called with a Request object

    csrfFetch previously only read headers from the init argument, so when it was called with a full Request object (e.g. csrfFetch(new Request(url, { headers }))), the Request's headers were stripped. It now merges headers from the Request, then the init argument, then the CSRF headers (CSRF headers always take precedence), making csrfFetch a drop-in replacement for fetch.

    Fixes Bug: csrfFetch strips headers when the first argument is a Request #49

  • #52 440e0af Thanks @muneebs! - chore(deps): patch transitive dev dependency security advisories

    Bumps pnpm overrides for vite (^6.4.1^6.4.2) and unhead (>=2.1.11>=2.1.13) to pull in patched versions. These are dev/build-time dependencies only — no runtime behavior or published API changes.

    Addresses:

    • GHSA: Vite arbitrary file read via dev server WebSocket (high, <=6.4.1)
    • GHSA: Vite path traversal in optimized deps .map handling (medium, <=6.4.1)
    • GHSA: Unhead hasDangerousProtocol() bypass via leading-zero padded HTML entities in useHeadSafe() (medium, <2.1.13)
  • Updated dependencies [440e0af]:

    • @csrf-armor/core@1.2.3

@github-actions github-actions Bot force-pushed the changeset-release/main branch from ec99f3b to 4c979a0 Compare April 21, 2026 22:52
@muneebs muneebs merged commit 17708d8 into main Apr 21, 2026
8 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Bug: csrfFetch strips headers when the first argument is a Request

1 participant