You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
It has been discovered that malicious HTML using special nesting techniques can bypass the depth checking added to DOMPurify in recent releases. It was also possible to use Prototype Pollution to weaken the depth check.
This renders dompurify unable to avoid XSS attack.
Fixed an mXSS sanitiser bypass reported by @icesfont
Added new code to track element nesting depth
Added new code to enforce a maximum nesting depth of 255
Added coverage tests and necessary clobbering protections
Note that this is a security release and should be upgraded to immediately. Please also note that further releases may follow as the underlying vulnerability is apparently new and further variations may be discovered.
Fixed an mXSS sanitizer bypass reported by @icesfont
Added new code to track element nesting depth
Added new code to enforce a maximum nesting depth of 255
Added coverage tests and necessary clobbering protections
Note that this is a security release and should be upgraded to immediately. Please also note that further releases may follow as the underlying vulnerability is apparently new and further variations may be discovered.
Renovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is.
♻ Renovate will retry this branch, including artifacts, only when one of the following happens:
any of the package files in this branch needs updating, or
the branch becomes conflicted, or
you click the rebase/retry checkbox if found above, or
you rename this PR's title to start with "rebase!" to trigger it manually
The artifact failure details are included below:
File name: package-lock.json
npm error code ERESOLVE
npm error ERESOLVE could not resolve
npm error
npm error While resolving: @craco/[email protected]
npm error Found: [email protected]
npm error node_modules/react-scripts
npm error react-scripts@"5.0.1" from the root project
npm error peer react-scripts@"^5" from [email protected]
npm error node_modules/craco-swc
npm error dev craco-swc@"0.5.1" from the root project
npm error
npm error Could not resolve dependency:
npm error peer react-scripts@"^4.0.0" from @craco/[email protected]
npm error node_modules/@craco/craco
npm error dev @craco/craco@"6.4.3" from the root project
npm error peer @craco/craco@"^6 || ^7" from [email protected]
npm error node_modules/craco-swc
npm error dev craco-swc@"0.5.1" from the root project
npm error
npm error Conflicting peer dependency: [email protected]
npm error node_modules/react-scripts
npm error peer react-scripts@"^4.0.0" from @craco/[email protected]
npm error node_modules/@craco/craco
npm error dev @craco/craco@"6.4.3" from the root project
npm error peer @craco/craco@"^6 || ^7" from [email protected]
npm error node_modules/craco-swc
npm error dev craco-swc@"0.5.1" from the root project
npm error
npm error Fix the upstream dependency conflict, or retry
npm error this command with --force or --legacy-peer-deps
npm error to accept an incorrect (and potentially broken) dependency resolution.
npm error
npm error
npm error For a full report see:
npm error /tmp/renovate/cache/others/npm/_logs/2025-02-14T22_50_14_881Z-eresolve-report.txt
npm error A complete log of this run can be found in: /tmp/renovate/cache/others/npm/_logs/2025-02-14T22_50_14_881Z-debug-0.log
renovatebot
changed the title
fix(deps): update dependency dompurify to v2.5.4 [security]
fix(deps): update dependency dompurify to v2.5.4 [security] - autoclosed
Dec 8, 2024
renovatebot
changed the title
fix(deps): update dependency dompurify to v2.5.4 [security] - autoclosed
fix(deps): update dependency dompurify to v2.5.4 [security]
Dec 8, 2024
renovatebot
changed the title
fix(deps): update dependency dompurify to v2.5.4 [security]
fix(deps): update dependency dompurify to v3 [security]
Feb 14, 2025
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
2.3.8
->3.2.4
GitHub Vulnerability Alerts
CVE-2024-45801
It has been discovered that malicious HTML using special nesting techniques can bypass the depth checking added to DOMPurify in recent releases. It was also possible to use Prototype Pollution to weaken the depth check.
This renders dompurify unable to avoid XSS attack.
Fixed by cure53/DOMPurify@1e52026 (3.x branch) and cure53/DOMPurify@26e1d69 (2.x branch).
CVE-2024-47875
DOMpurify was vulnerable to nesting-based mXSS
fixed by 0ef5e537 (2.x) and
merge 943
Backporter should be aware of GHSA-mmhx-hmjr-r674 (CVE-2024-45801) when cherry-picking
POC is avaible under test
CVE-2024-48910
dompurify was vulnerable to prototype pollution
Fixed by cure53/DOMPurify@d1dd037
CVE-2025-26791
DOMPurify before 3.2.4 has an incorrect template literal regular expression, sometimes leading to mutation cross-site scripting (mXSS).
Release Notes
cure53/DOMPurify (dompurify)
v3.2.4
: DOMPurify 3.2.4Compare Source
v3.2.3
: DOMPurify 3.2.3Compare Source
v3.2.2
: DOMPurify 3.2.2Compare Source
v3.2.1
Compare Source
v3.2.0
: DOMPurify 3.2.0Compare Source
v3.1.7
: DOMPurify 3.1.7Compare Source
foreignObject
element from the list of HTML entry-points, thanks @masatokinugawav3.1.6
: DOMPurify 3.1.6Compare Source
v3.1.5
: DOMPurify 3.1.5Compare Source
bower.js
, thanks @HakumenNCv3.1.4
: DOMPurify 3.1.4Compare Source
isNaN
checks, thanks @tulachv3.1.3
: DOMPurify 3.1.3Compare Source
nodeType
property, thanks @ssi02014v3.1.2
: DOMPurify 3.1.2Compare Source
v3.1.1
: DOMPurify 3.1.1Compare Source
Note that this is a security release and should be upgraded to immediately. Please also note that further releases may follow as the underlying vulnerability is apparently new and further variations may be discovered.
v3.1.0
: DOMPurify 3.1.0Compare Source
SAFE_FOR_XML
to enable better control over comment scrubbingv3.0.11
: DOMPurify 3.0.11Compare Source
v3.0.10
: DOMPurify 3.0.10Compare Source
v3.0.9
: DOMPurify 3.0.9Compare Source
hasOwnProperty
logic, thanks @ssi02014console.warn
making HappyDom happier, thanks @HugoPoiv3.0.8
: DOMPurify 3.0.8Compare Source
v3.0.7
: DOMPurify 3.0.7Compare Source
v3.0.6
: DOMPurify 3.0.6Compare Source
v3.0.5
: DOMPurify 3.0.5Compare Source
v3.0.4
: DOMPurify 3.0.4Compare Source
shadowrootmod
which should beshadowrootmode
, thanks @masatokinugawav3.0.3
: DOMPurify 3.0.3Compare Source
TRUSTED_TYPES_POLICY
configuration option, thanks @dejangfeDropShadow
to the SVG filter allow-list, thanks @SelfMadeSystemv3.0.2
: DOMPurify 3.0.2Compare Source
ALLOWED_URI_REGEXP
not being reset, thanks @mukilanemprescripts
tag to allowed MathML elements, thanks @duyhai94v3.0.1
: DOMPurify 3.0.1Compare Source
v3.0.0
: DOMPurify 3.0.0Compare Source
ALLOW_SELF_CLOSE_IN_ATTR
flag, thanks @edg2s @AndreVirtimoshadowrootmode
, thanks @mfreed7NOTE Please use the 2.4.4 release if you still need MSIE support, 3.0.0 comes without the MSIE overhead
v2.5.8
: DOMPurify 2.5.8Compare Source
v2.5.7
: DOMPurify 2.5.7Compare Source
foreignObject
element from the list of HTML entry-points, thanks @masatokinugawav2.5.6
: DOMPurify 2.5.6Compare Source
v2.5.5
: DOMPurify 2.5.5Compare Source
bower.js
, thanks @HakumenNCv2.5.4
: DOMPurify 2.5.4Compare Source
isNaN
checks affecting MSIE, thanks @tulachv2.5.3
: DOMPurify 2.5.3Compare Source
v2.5.2
: DOMPurify 2.5.2Compare Source
v2.5.1
: DOMPurify 2.5.1Compare Source
Note that this is a security release and should be upgraded to immediately. Please also note that further releases may follow as the underlying vulnerability is apparently new and further variations may be discovered.
v2.5.0
: DOMPurify 2.5.0Compare Source
SAFE_FOR_XML
to enable better control over comment scrubbingv2.4.9
: DOMPurify 2.4.9Compare Source
v2.4.8
: DOMPurify 2.4.8Compare Source
v2.4.7
: DOMPurify 2.4.7Compare Source
v2.4.6
: DOMPurify 2.4.6Compare Source
noframes
element is permitted, thanks @leeNv2.4.5
: DOMPurify 2.4.5Compare Source
v2.4.4
: DOMPurify 2.4.4Compare Source
ALLOW_SELF_CLOSE_IN_ATTR
flag, thanks @edg2s @AndreVirtimoshadowrootmode
, thanks @mfreed7v2.4.3
: DOMPurify 2.4.3Compare Source
v2.4.2
: DOMPurify 2.4.2Compare Source
v2.4.1
: DOMPurify 2.4.1Compare Source
ALLOWED_NAMESPACES
for better XML handling, thanks @kevin-deyoungster @tosmolkaSAFE_FOR_TEMPLATES
istrue
v2.4.0
: DOMPurify 2.4.0Compare Source
v2.3.12
: DOMPurify 2.3.12Compare Source
v2.3.11
: DOMPurify 2.3.11Compare Source
v2.3.10
: DOMPurify 2.3.10Compare Source
v2.3.9
: DOMPurify 2.3.9Compare Source
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.