Skip to content

chore(deps): update dependency nuxt-og-image to v6 [security]#296

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/npm-nuxt-og-image-vulnerability
Open

chore(deps): update dependency nuxt-og-image to v6 [security]#296
renovate[bot] wants to merge 1 commit intomainfrom
renovate/npm-nuxt-og-image-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate bot commented Apr 1, 2026

ℹ️ Note

This PR body was truncated due to platform limits.

This PR contains the following updates:

Package Change Age Confidence
nuxt-og-image (source) ^5.1.13^6.0.0 age confidence

GitHub Vulnerability Alerts

CVE-2026-34404

Product: Nuxt OG Image
Version: 6.1.2
CWE-ID: CWE-404: Improper Resource Shutdown or Release
Description: Failure to limit the length and width of the generated image results in a denial of service.
Impact: Denial of service
Exploitation condition: An external user
Mitigation: Implement a limitation on the width and length of the generated image.
Researcher: Dmitry Prokhorov (Positive Technologies)

Research

During the analysis of the nuxt-og-image package, which is shipped with the nuxt-seo package, a zero‑day vulnerability was discovered.
This research revealed that the image‑generation component by the URI: /_og/d/ (and, in older versions, /og-image/) contains a Denial of Service (DoS) vulnerability. The issue arises because there is no restriction on the width and height parameters of the generated image. The vulnerability was reproduced using the standard configuration and the default templates.

Listing 1. The content of the configuration file nuxt.config.ts

export default defineNuxtConfig({
  modules: ['nuxt-og-image'],
  devServer: {
    host: 'web-test.local',
    port: 3000
  },
  site: {
    url: 'http://web-test.local:3000',
  },
  ogImage: {
    fonts: [
      'Inter:400', 
      'Inter:700'
    ],
  }
})

Vulnerability reproduction

To demonstrate the proof‑of‑concept, a request should be sent with the increased width and height parameters. This will cause a delay and exhaust the server’s resources during image generation.

Listing 2. HTTP-request example

GET /_og/d/og.png?width=20000&height=20000 HTTP/1.1
Host: web-test.local:3000

Figure 1. HTTP-response: denial-of-service error
image

After sending a HTTP-request, the test server's memory was exhausted.

Figure 2. Video memory exhausted error
image

Credits

Researcher: Dmitry Prokhorov (Positive Technologies)

GHSA-pqhr-mp3f-hrpp

Product: Nuxt OG Image
Version: < 6.2.5
CWE-ID: CWE-918: Server-Side Request Forgery

Description

The image generation endpoint (/_og/d/) accepts user-controlled parameters that are passed to the server-side renderer without proper validation or filtering. An attacker can trigger server-side requests to internal network addresses through multiple vectors.

Impact

  • Scanning internal ports and services inaccessible from the outside
  • Reading sensitive data from cloud infrastructure metadata services (tokens, credentials) when verbose error output is enabled

Attack Vectors

Three distinct vectors were identified, all exploiting the same underlying lack of URL validation:

Vector 1: CSS background-image injection via style parameter

GET /_og/d/og.png?style=background-image:+url('http://127.0.0.1:8888/secret')

Vector 2: <img src> injection via html parameter

GET /_og/d/og.png?html=<img src="http://127.0.0.1:8888/secret">

When verbose errors are enabled, the response content is leaked in base64-encoded error messages.

Vector 3: SVG <image href> injection via html parameter

GET /_og/d/og.png?html=<svg><image href="http://127.0.0.1:8888/secret"></svg>

Mitigation

Fixed in v6.2.5. The image source plugin now blocks requests to private IP ranges (IPv4/IPv6), loopback addresses, link-local addresses, and cloud metadata endpoints. Decimal/hexadecimal IP encoding bypasses are also handled.

Credits

Researcher: Dmitry Prokhorov (Positive Technologies)

CVE-2026-34405

Product: Nuxt OG Image
Version: 6.1.2
CWE-ID: CWE-79: Improper Neutralization of Input During Web Page Generation
Description: Incorrect parsing of GET parameters leads to the possibility of HTML injection and JavaScript code injection.
Impact: Client-Side JavaScript Execution
Exploitation condition: An external user
Mitigation: Correct the logic of parsing GET parameters and their subsequent implementation into the generated page.
Researcher: Dmitry Prokhorov (Positive Technologies)

Research

During the analysis of the nuxt-og-image package, which is shipped with the nuxt-seo package, a zero‑day vulnerability was discovered.
This research revealed that the image‑generation component by the URI: /_og/d/ (and, in older versions, /og-image/) contains a vulnerability that allows injection of arbitrary attributes into the HTML page body. The vulnerability was reproduced using the standard configuration and the default templates.

Listing 1. The content of the configuration file nuxt.config.ts

export default defineNuxtConfig({
  modules: ['nuxt-og-image'],
  devServer: {
    host: 'web-test.local',
    port: 3000
  },
  site: {
    url: 'http://web-test.local:3000',
  },
  ogImage: {
    fonts: [
      'Inter:400', 
      'Inter:700'
    ],
  }
})

Vulnerability reproduction

To demonstrate the proof‑of‑concept, follow the URI: /_og/d/og.html?width=1000&height=1000&onmouseover=alert(document.cookie)&autofocus
The injected parameters onmouseover=alert(document.cookie) and autofocus are treated as attributes and are inserted directly into the generated HTML page.

Listing 2. HTTP-request example

GET /_og/d/og.html?width=1000&height=1000&onmouseover=alert(document.cookie) HTTP/1.1
Host: web-test.local:3000

Figure 1. The injected attribute in the HTML body
image

Figure 2. JavaScript code execution
image

Credits

Researcher: Dmitry Prokhorov (Positive Technologies)


Release Notes

nuxt-modules/og-image (nuxt-og-image)

v6.2.5

Compare Source

   🐞 Bug Fixes
    View changes on GitHub

v6.2.4

Compare Source

compare changes

🩹 Fixes
  • Hydration-issue warning due to SSR generated DateTime value (#​535)
  • Sanitize component props (#​543)
  • Harden security defaults (#​540)
  • Whitelist component props to prevent cache key DoS (#​544)
🏡 Chore
❤️ Contributors

v6.2.3

Compare Source

   🐞 Bug Fixes
   🏎 Performance
    View changes on GitHub

v6.2.2

Compare Source

compare changes

🔥 Performance
  • devtools: Drop json-editor-vue (14a585b7)
🩹 Fixes
  • cloudflare: Detect legacy assets mode (7f60a480)
🏡 Chore
❤️ Contributors

v6.2.1

Compare Source

compare changes

🏡 Chore
❤️ Contributors

v6.2.0

Compare Source

compare changes

🩹 Fixes
  • Missing compatibility config (4541033c)
  • devtools: Broken resolution (57ac2647)
🏡 Chore
❤️ Contributors

v6.1.2

Compare Source

compare changes

🚀 Enhancements
  • content: Add defineOgImageSchema() composable (#​520)
🩹 Fixes
  • Update pnpm-lock.yaml (0784c378)
  • Broken slash decoding in some cases (6f8ac765)
  • client: Resolve layer-devtools path via import.meta.resolve (dd4e0578)
  • cloudflare: Resolve fonts via localFetch when ASSETS binding unavailable (#​527)
  • B64 encode props with URL-sensitive characters (#​530)
  • Resolve CI issues (f3e3045b)
  • Use explicit imports mapping for #nuxtseo-shared (08594505)
  • Use direct nuxtseo-shared/runtime imports, bump to ^0.3.0 (31b1a991)
  • Resolve CI failures in lint, build, typecheck, and tests (47e85d35)
  • Use dot-notation for ambiguous CalcTest component in type test (3ba63fef)
💅 Refactors
  • Migrate to nuxtseo-shared for shared utilities (f909f014)
  • client: Migrate devtools to nuxtseo-shared layer (48c15483)
  • Use published nuxtseo-layer-devtools package (74393aa3)
  • Remove dead defensive prerender initialization (3b0dae14)
  • Use nuxtseo-shared subpath exports, bump to ^0.5.0 (bd50740f)
  • Migrate to nuxtseo-shared (#​521)
🏡 Chore
✅ Tests
  • Update cloudflare-takumi snapshots after template redesign (66c2a80a)
❤️ Contributors

v6.1.1

Compare Source

compare changes

🩹 Fixes
  • Auto-detect NuxtHub KV for cache storage (#​517)
  • tw4: Use safe module resolution to prevent throws for unresolvable plugins (#​519)
🏡 Chore
❤️ Contributors

v6.1.0

Compare Source

compare changes

🩹 Fixes
  • Add missing option keys to URL encoding and prop separation (#​516)
  • Defer x-nitro-prerender header to prevent stale hash URLs during prerender (#​514)
  • Base64-encode non-ASCII values in URL path params (#​515)
🏡 Chore
❤️ Contributors

v6.0.7

Compare Source

compare changes

🚀 Enhancements
  • devtools: Add production preview toggle (#​509)
  • cli: Add create and switch commands with DX improvements (#​508)
  • devtools: Add component creation from empty state (#​510)
🩹 Fixes
  • encoding: Avoid pre decoded params to be truncated (#​504)
  • fonts: Detect font families from script setup computed properties (#​507)
  • devtools: Use actual content width for preview scaling (#​506)
  • Recover from v5 defineOgImage syntax (1e882060)
🏡 Chore
❤️ Contributors

v6.0.6

Compare Source

compare changes

🩹 Fixes
  • Broken windows path resolutions (dd1ae90b)
🏡 Chore
❤️ Contributors

v6.0.5

Compare Source

compare changes

🩹 Fixes
  • Prevent crash when defineOgImage runs client-side during layout transitions (#​502)
  • takumi: Use real font family names for correct font-weight matching (#​503)
🏡 Chore
❤️ Contributors

v6.0.4

Compare Source

compare changes

🏡 Chore
❤️ Contributors

v6.0.3

Compare Source

compare changes

🩹 Fixes
🏡 Chore
❤️ Contributors

v6.0.2

Compare Source

   🐞 Bug Fixes
    View changes on GitHub

v6.0.1

Compare Source

   🐞 Bug Fixes
    View changes on GitHub

v6.0.0

Compare Source

Nuxt OG Image v6 is the next major release.

Nuxt OG Image v6 brings a complete overhaul focused on performance, modern tooling, and developer experience.

📣 Highlights

  • 🚀 Takumi - Takumi is now the recommended renderer, offering 2-10x faster image generation with the same feature set as Satori
  • 🎨 First-class CSS support - Tailwind v4, UnoCSS, CSS variables, and Nuxt UI v3 colors all just work out of the box
  • 🖥️ Redesigned DevTools - improved OG image debugging experience with better previews, accessibility, and Bluesky social card support

📖 Migration Guide

Full migration guide: https://nuxtseo.com/og-image/migration-guide/v6

Quick Migration
npx nuxt-og-image migrate v6

Notable Changes

🚀 Takumi Renderer (Recommended)

Takumi is a Rust-based renderer that directly rasterizes to PNG/JPEG/WebP - no SVG intermediate step. It's 2-10x faster than Satori+Resvg.

See PR #​414.

Takumi and Satori are feature-compatible within Nuxt OG Image - both support Tailwind CSS, custom fonts, emoji, edge runtimes, and all the same template features. The difference is speed: Takumi is always faster thanks to its Rust-based direct rasterization.

Use Takumi by creating components with the .takumi.vue suffix:

components/OgImage/MyTemplate.takumi.vue

See the Takumi docs for the full feature list.

🎨 First-Class CSS Support

Nuxt OG Image now has first-class support for multiple CSS approaches - not just Tailwind. All of these work out of the box with zero configuration:

See PR #​430.

  • Tailwind v4 - build-time class extraction with Tailwind's CSS engine, @theme values just work
  • UnoCSS - full UnoCSS support
  • CSS Variables - use your app's CSS custom properties directly in OG image templates
  • Nuxt UI v3 - semantic colors (primary, secondary, etc.) are automatically resolved

No configuration needed.

🖥️ Redesigned DevTools

The OG image DevTools have been completely overhauled:

  • Better image preview and debugging
  • More accessible interface
  • Improved error reporting and diagnostics
  • Bluesky social card support
⚡ Install Renderer Dependencies

Renderer dependencies are no longer bundled. Install what you need based on your renderer and runtime.

See PR #​415.

Takumi (recommended):

npm i @&#8203;takumi-rs/core # Node.js
npm i @&#8203;takumi-rs/wasm # Edge runtimes

Satori:

npm i satori @&#8203;resvg/resvg-js # Node.js
npm i satori @&#8203;resvg/resvg-wasm # Edge runtimes

Browser:

npm i playwright-core

Running nuxi dev will prompt you to install missing dependencies automatically.

🖼️ Multiple OG Images Per Page

Define multiple images with different dimensions for different platforms. Shared props are passed once and applied to all variants.

See PR #​305.

Shared Props with Variants (Recommended)

Pass shared props as the second argument and size variants as the third — no prop duplication needed:

defineOgImage('NuxtSeo', { title: 'My Page' }, [
  { key: 'og' }, // Default 1200x600 for Twitter/Facebook
  { key: 'whatsapp', width: 800, height: 800 }, // Square for WhatsApp
])

Per-variant props override shared props when needed:

defineOgImage('NuxtSeo', { title: 'My Page', description: 'Full description' }, [
  { key: 'og' },
  { key: 'whatsapp', width: 800, height: 800, props: { description: 'Short' } },
])
Array Syntax

Alternatively, pass all options inline per variant:

defineOgImage('NuxtSeo', [
  { props: { title: 'My Page' } },
  { props: { title: 'My Page' }, key: 'whatsapp', width: 800, height: 800 },
])
🔤 @​nuxt/fonts Integration

Custom fonts now use @​nuxt/fonts instead of the legacy ogImage.fonts config.

See PR #​432.

export default defineNuxtConfig({
  modules: ['@&#8203;nuxt/fonts', 'nuxt-og-image'],
  fonts: {
    families: [
      { name: 'Inter', weights: [400, 700], global: true }
    ]
  }
})

The global: true option is required for fonts to be available in OG Image rendering.

📦 Component Renderer Suffix

OG Image components now require a renderer suffix in their filename. This enables automatic renderer detection, multiple renderer variants, and tree-shaking.

See PR #​433.

# Before
components/OgImage/MyTemplate.vue

# After
components/OgImage/MyTemplate.takumi.vue # Recommended
components/OgImage/MyTemplate.satori.vue

Run the migration CLI to rename automatically:

npx nuxt-og-image migrate v6
🏷️ Community Templates Must Be Ejected

Community templates (NuxtSeo, SimpleBlog, etc.) are no longer bundled in production. Eject them to your project before building.

See PR #​426.

npx nuxt-og-image eject NuxtSeo

Templates continue to work in development without ejecting.

🔗 New URL Structure

OG Image URLs now use a Cloudinary-style format with options encoded in the path. This enables better CDN caching since identical options produce identical URLs.

See PR #​305.

v5 v6
/__og-image__/image/ /_og/d/
/__og-image__/static/ /_og/s/
   🚨 Breaking Changes
   🚀 Features
   🐞 Bug Fixes

Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/npm-nuxt-og-image-vulnerability branch from f693869 to 7942fab Compare April 1, 2026 17:15
@renovate renovate bot force-pushed the renovate/npm-nuxt-og-image-vulnerability branch from 7942fab to 9d6b9fa Compare April 8, 2026 20:06
@coderabbitai
Copy link
Copy Markdown

coderabbitai bot commented Apr 8, 2026

Warning

Rate limit exceeded

@renovate[bot] has exceeded the limit for the number of commits that can be reviewed per hour. Please wait 11 minutes and 40 seconds before requesting another review.

Your organization is not enrolled in usage-based pricing. Contact your admin to enable usage-based pricing to continue reviews beyond the rate limit, or try again in 11 minutes and 40 seconds.

⌛ How to resolve this issue?

After the wait time has elapsed, a review can be triggered using the @coderabbitai review command as a PR comment. Alternatively, push new commits to this PR.

We recommend that you space out your commits to avoid hitting the rate limit.

🚦 How do rate limits work?

CodeRabbit enforces hourly rate limits for each developer per organization.

Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout.

Please see our FAQ for further information.

ℹ️ Review info
⚙️ Run configuration

Configuration used: defaults

Review profile: CHILL

Plan: Pro

Run ID: c57af279-9b88-4cd6-bea0-fcb8c41c9937

📥 Commits

Reviewing files that changed from the base of the PR and between 9d6b9fa and 79c6c8f.

⛔ Files ignored due to path filters (1)
  • pnpm-lock.yaml is excluded by !**/pnpm-lock.yaml
📒 Files selected for processing (1)
  • package.json
📝 Walkthrough

Walkthrough

Updated the nuxt-og-image dependency from version 5.1.13 to 6.0.0 in package.json. This is a major version bump that will change the resolved library code used for Nuxt Open Graph image generation functionality.

Changes

Cohort / File(s) Summary
Dependency Version Update
package.json
Bumped nuxt-og-image from ^5.1.13 to ^6.0.0

Estimated code review effort

🎯 1 (Trivial) | ⏱️ ~2 minutes

Poem

🐰 A hoppy update, hop-hop hooray!
From five to six, a major way,
og-image takes its biggest leap,
New features bundled, oh-so-sweet!
✨ 🌟

🚥 Pre-merge checks | ✅ 3
✅ Passed checks (3 passed)
Check name Status Explanation
Description Check ✅ Passed Check skipped - CodeRabbit’s high-level summary is enabled.
Title check ✅ Passed The PR title accurately reflects the main change: updating nuxt-og-image dependency from v5 to v6 to address security vulnerabilities.
Docstring Coverage ✅ Passed No functions found in the changed files to evaluate docstring coverage. Skipping docstring coverage check.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Commit unit tests in branch renovate/npm-nuxt-og-image-vulnerability

Comment @coderabbitai help to get the list of available commands and usage tips.

Copy link
Copy Markdown

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🧹 Nitpick comments (3)
package.json (3)

27-27: Verify lockfile update and test thoroughly before deployment.

Given the security-critical nature of this update and the major version bump, ensure:

  1. The lockfile (pnpm-lock.yaml) is updated to resolve to v6.2.5 or later
  2. Image generation endpoints are tested with the attack vectors mentioned in the CVEs:
    • Large dimension parameters (e.g., width=20000&height=20000)
    • SSRF payloads via CSS background-image, img src, or SVG href
    • XSS payloads via query parameters (e.g., onmouseover=alert())
  3. Existing og:image meta tags still render correctly
  4. Performance is acceptable with the new Takumi renderer
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@package.json` at line 27, Bump of "nuxt-og-image" to a major version requires
updating the lockfile and thorough testing: update pnpm-lock.yaml to ensure the
resolved version is >= v6.2.5, run an install to lock dependencies, then test
your image-generation endpoints (the nuxt-og-image handlers/Takumi renderer
paths) against the CVE vectors — very large dimension params (e.g.,
width=20000&height=20000), SSRF payloads via CSS background-image, img src, and
SVG href, and XSS payloads in query params (e.g., onmouseover=alert()); also
verify existing og:image meta tag rendering still works and run performance/load
tests to confirm the Takumi renderer meets SLAs before merging/deploying.

27-27: Consider adding application-level security controls.

While updating to v6.2.5+ addresses the library vulnerabilities, consider implementing defense-in-depth measures:

  1. Rate limiting: Protect the /_og/* endpoints from abuse even with dimension limits in place
  2. Content Security Policy: Add CSP headers to prevent XSS even if parameter sanitization fails
  3. Network egress filtering: If feasible, restrict the Nuxt server's outbound network access to prevent SSRF to internal services
  4. Monitoring: Log and alert on suspicious og-image requests (unusually large dimensions, private IPs in parameters, etc.)
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@package.json` at line 27, The dependency update for "nuxt-og-image" should be
accompanied by application-level security controls: upgrade "nuxt-og-image" to
>=6.2.5 in package.json, add rate-limiting middleware that targets the /_og/*
endpoints (or the Nuxt route handler that serves og images) to block abusive
request rates, enforce strict dimension and host validation in the nuxt-og-image
request handler (validate params and reject private IP/hostname values), add CSP
and other security headers via nuxt.config (e.g., render.headers or a
Helmet-like middleware) to reduce XSS risk, and ensure monitoring/logging is
added around the og-image generation code (log oversized dimension requests,
blocked host attempts, and rate-limit hits) while considering network egress
restrictions at the deployment/network layer (e.g., VPC firewall or network
policy) to prevent SSRF.

27-27: Consider specifying ^6.2.5 as the minimum version to explicitly include the SSRF security fix.

The SSRF vulnerability (GHSA-pqhr-mp3f-hrpp) was patched in v6.2.5. While ^6.0.0 will typically resolve to the latest available version (6.3.3), explicitly specifying ^6.2.5 makes the security intent clearer and protects against edge cases with pinned lockfiles or unusual dependency resolution scenarios.

Proposed change
-    "nuxt-og-image": "^6.0.0",
+    "nuxt-og-image": "^6.2.5",
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@package.json` at line 27, Update the nuxt-og-image dependency declaration to
require at least the patched release by changing the version specifier from
"^6.0.0" to "^6.2.5" in package.json (the "nuxt-og-image" entry), then reinstall
and commit the updated lockfile (npm/yarn/pnpm install) so the SSRF fix
(GHSA-pqhr-mp3f-hrpp) is actually enforced across environments.
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Nitpick comments:
In `@package.json`:
- Line 27: Bump of "nuxt-og-image" to a major version requires updating the
lockfile and thorough testing: update pnpm-lock.yaml to ensure the resolved
version is >= v6.2.5, run an install to lock dependencies, then test your
image-generation endpoints (the nuxt-og-image handlers/Takumi renderer paths)
against the CVE vectors — very large dimension params (e.g.,
width=20000&height=20000), SSRF payloads via CSS background-image, img src, and
SVG href, and XSS payloads in query params (e.g., onmouseover=alert()); also
verify existing og:image meta tag rendering still works and run performance/load
tests to confirm the Takumi renderer meets SLAs before merging/deploying.
- Line 27: The dependency update for "nuxt-og-image" should be accompanied by
application-level security controls: upgrade "nuxt-og-image" to >=6.2.5 in
package.json, add rate-limiting middleware that targets the /_og/* endpoints (or
the Nuxt route handler that serves og images) to block abusive request rates,
enforce strict dimension and host validation in the nuxt-og-image request
handler (validate params and reject private IP/hostname values), add CSP and
other security headers via nuxt.config (e.g., render.headers or a Helmet-like
middleware) to reduce XSS risk, and ensure monitoring/logging is added around
the og-image generation code (log oversized dimension requests, blocked host
attempts, and rate-limit hits) while considering network egress restrictions at
the deployment/network layer (e.g., VPC firewall or network policy) to prevent
SSRF.
- Line 27: Update the nuxt-og-image dependency declaration to require at least
the patched release by changing the version specifier from "^6.0.0" to "^6.2.5"
in package.json (the "nuxt-og-image" entry), then reinstall and commit the
updated lockfile (npm/yarn/pnpm install) so the SSRF fix (GHSA-pqhr-mp3f-hrpp)
is actually enforced across environments.

ℹ️ Review info
⚙️ Run configuration

Configuration used: defaults

Review profile: CHILL

Plan: Pro

Run ID: ca2f5486-1766-4d62-bc76-13036844cb7f

📥 Commits

Reviewing files that changed from the base of the PR and between 11309c1 and 9d6b9fa.

⛔ Files ignored due to path filters (1)
  • pnpm-lock.yaml is excluded by !**/pnpm-lock.yaml
📒 Files selected for processing (1)
  • package.json

@renovate renovate bot force-pushed the renovate/npm-nuxt-og-image-vulnerability branch from 9d6b9fa to 79c6c8f Compare April 13, 2026 10:52
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants