Skip to content

Conversation

@github-actions
Copy link

Vulnerabilities associated with js-yaml/3.5.5

BDSA-2019-2158 (HIGH): js-yaml is vulnerable to code injection due to incorrect parsing of YAML documents. An attacker could exploit this vulnerability by supplying a maliciously crafted YAML file to a vulnerable application using js-yaml and the unsafe load() function to parse YAML data.

BDSA-2025-27523 (HIGH): js-yaml is vulnerable to a prototype pollution issue due to a lack of sufficient validation in the storeMappingPair functionality.

An attacker could supply a crafted YAML document that includes __proto__ nodes designed to modify prototypes of the resulting parsed document. In applications that parse untrusted YAML data, this issue could lead to unexpected behavior or potentially the execution of arbitrary code.

Click Here To See More Details On Server

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant