fix: CVE-2025-64718 - update js-yaml to >=4.1.1 [cari]#39
fix: CVE-2025-64718 - update js-yaml to >=4.1.1 [cari]#39
Conversation
|
| "node": ">=14.0.0" | ||
| }, | ||
| "resolutions": { | ||
| "js-yaml": "^4.1.1" |
There was a problem hiding this comment.
js-yaml 4.x resolution may break 3.x-dependent packages
Medium Severity
The resolutions field forces all js-yaml dependencies to use ^4.1.1, but packages @changesets/parse and read-yaml-file in the dependency tree require js-yaml 3.x and likely use APIs that were removed in 4.x (e.g., safeLoad() was renamed to load()). This could cause runtime errors when using @changesets/cli. The CVE is also fixed in js-yaml 3.14.2, which would be API-compatible with these packages.
|
Hey @timgent - Could you please review this PR when you get a chance? Let me know if you have any questions. Thanks! |
Updates js-yaml to >=4.1.1 to fix prototype pollution vulnerability (CVE-2025-64718).
Note
Addresses security by pinning
js-yamlto^4.1.1viaresolutionsand updates related lockfile entries."resolutions": { "js-yaml": "^4.1.1" }inpackage.json(prototype pollution fix)yarn.lock:js-yaml@4.1.1,argparse@2.x, removeesprimareferences, refresh checksumspackage.jsonbinfrom object to string pointing to./dist/index.jsWritten by Cursor Bugbot for commit 7d464ba. Configure here.