Skip to content

Cross-Site Scripting in serialize-to-js

Low severity GitHub Reviewed Published Dec 6, 2019 in commenthol/serialize-to-js • Updated Nov 6, 2023

Package

npm serialize-to-js (npm)

Affected versions

< 3.0.1

Patched versions

3.0.1

Description

Versions of serialize-to-js prior to 3.0.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize serialized regular expressions. This vulnerability does not affect Node.js applications.

Recommendation

Upgrade to version 3.0.1 or later.

References

@commenthol commenthol published to commenthol/serialize-to-js Dec 6, 2019
Published to the GitHub Advisory Database Dec 6, 2019
Reviewed Jun 16, 2020
Last updated Nov 6, 2023

Severity

Low
3.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L

Weaknesses

CVE ID

CVE-2019-16772

GHSA ID

GHSA-3fjq-93xj-3f3f

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.