chore(release): publish libraries [WPB-22420]#20513
Conversation
|
| languageName: node | ||
| linkType: hard | ||
|
|
||
| "fast-xml-parser@npm:5.2.5": |
There was a problem hiding this comment.
High severity vulnerability may affect your project—review required:
Line 17103 lists a dependency (fast-xml-parser) with a known High severity vulnerability.
ℹ️ Why this matters
Affected versions of fast-xml-parser are vulnerable to Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion'). fast-xml-parser can be denial-of-service'd via uncontrolled XML entity expansion: a crafted XML document with a DOCTYPE that defines a large plain-text entity and references it many times causes OrderedObjParser.replaceEntitiesValue() to repeatedly expand the entity without any limit on output size or replacement work, blocking the Node.js event loop and freezing the application while parsing untrusted XML (mitigate by disabling entity/DOCTYPE processing, e.g., processEntities: false).
To resolve this comment:
Check if you are using fxparser on the CLI.
- If you're affected, upgrade this dependency to at least version 5.3.6 at yarn.lock.
- If you're not affected, comment
/fp we don't use this [condition]
💬 Ignore this finding
To ignore this, reply with:
/fp <comment>for false positive/ar <comment>for acceptable risk/other <comment>for all other reasons
You can view more details on this finding in the Semgrep AppSec Platform here.
| languageName: node | ||
| linkType: hard | ||
|
|
||
| "fast-xml-parser@npm:5.2.5": |
There was a problem hiding this comment.
High severity vulnerability may affect your project—review required:
Line 17103 lists a dependency (fast-xml-parser) with a known High severity vulnerability.
ℹ️ Why this matters
Affected versions of fast-xml-parser are vulnerable to Improper Input Validation / Uncaught Exception. A RangeError in fast-xml-parser's numeric entity handling allows an attacker to crash any application parsing untrusted XML. The parser uses String.fromCodePoint on decimal or hex entities without bounds checking (e.g. � or �), which throws an uncaught exception and terminates the Node.js process, resulting in a denial-of-service.
To resolve this comment:
Check if you are using fxparser on the CLI.
- If you're affected, upgrade this dependency to at least version 5.3.4 at yarn.lock.
- If you're not affected, comment
/fp we don't use this [condition]
💬 Ignore this finding
To ignore this, reply with:
/fp <comment>for false positive/ar <comment>for acceptable risk/other <comment>for all other reasons
You can view more details on this finding in the Semgrep AppSec Platform here.
| languageName: node | ||
| linkType: hard | ||
|
|
||
| "fast-xml-parser@npm:5.2.5": |
There was a problem hiding this comment.
Critical severity vulnerability may affect your project—review required:
Line 17103 lists a dependency (fast-xml-parser) with a known Critical severity vulnerability.
ℹ️ Why this matters
Affected versions of fast-xml-parser are vulnerable to Incorrect Regular Expression. fast-xml-parser is vulnerable to an entity-encoding bypass when parsing untrusted XML with DOCTYPE entities enabled (the default processEntities: true): attacker-controlled DOCTYPE entity names are interpolated into RegExp() without escaping . (dot), so a name like l. becomes a wildcard regex that shadows built-in entities such as <, >, &, ", and ', allowing arbitrary replacement text and leading to XSS (or other injection) when the parsed output is later rendered or used in an injection-sensitive context.
To resolve this comment:
Check if you are using fxparser on the CLI.
- If you're affected, upgrade this dependency to at least version 5.3.5 at yarn.lock.
- If you're not affected, comment
/fp we don't use this [condition]
💬 Ignore this finding
To ignore this, reply with:
/fp <comment>for false positive/ar <comment>for acceptable risk/other <comment>for all other reasons
You can view more details on this finding in the Semgrep AppSec Platform here.
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## dev #20513 +/- ##
==========================================
- Coverage 45.40% 45.40% -0.01%
==========================================
Files 1637 1637
Lines 40364 40364
Branches 8334 8334
==========================================
- Hits 18327 18326 -1
Misses 20101 20101
- Partials 1936 1937 +1
Flags with carried forward coverage won't be shown. Click here to find out more. 🚀 New features to boost your workflow:
|
|
🔗 Download Full Report Artifact 🧪 Playwright Test Summary
|



Automated release PR created by nx release.⚠️ Important: Squash-merge this PR (do not use 'Merge commit').