You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
I am using the api package and recently encountered a critical security vulnerability caused by a transitive dependency on jsonpath-plus. This package is vulnerable to remote code execution (RCE) in versions prior to 10.0.7, as outlined in GitHub Advisory GHSA-pppg-cpfq-h7wr.
Issue:
When manually upgrading oas to 25.2.1 to mitigate the vulnerability, compatibility issues arise with @readme/api due to breaking changes introduced in oas versions between 25.0.2 and 25.2.1.
Request:
Please update the oas dependency to ^25.2.1 or later within @readme/api.
Steps to Reproduce
Install @readme/api.
Run npm audit to identify the vulnerability in jsonpath-plus.
Upgrade oas to 25.2.1.
Attempt to use @readme/api and observe compatibility issues due to breaking changes in oas.
Description:
I am using the api package and recently encountered a critical security vulnerability caused by a transitive dependency on
jsonpath-plus
. This package is vulnerable to remote code execution (RCE) in versions prior to 10.0.7, as outlined in GitHub Advisory GHSA-pppg-cpfq-h7wr.Issue:
When manually upgrading oas to
25.2.1
to mitigate the vulnerability, compatibility issues arise with@readme/api
due to breaking changes introduced inoas
versions between25.0.2
and25.2.1
.Request:
Please update the oas dependency to
^25.2.1
or later within @readme/api.Steps to Reproduce
@readme/api
.npm
audit to identify the vulnerability injsonpath-plus
.oas
to25.2.1
.@readme/api
and observe compatibility issues due to breaking changes inoas
.References
GitHub Advisory GHSA-pppg-cpfq-h7wr
The text was updated successfully, but these errors were encountered: