-
Notifications
You must be signed in to change notification settings - Fork 18
Open
Labels
dependenciesPull requests that update a dependency filePull requests that update a dependency filesecurity
Description
Security Vulnerability Report
Summary
- Package:
handlebars - Affected Version:
4.7.8(transitive viats-jest) - Severity:
CRITICAL - GHSA:
GHSA-2w6w-674q-4c4q(and related: GHSA-xjpj-3mr7-gcpf, GHSA-xhpv-hc6g-r9c6, GHSA-9cx6-37pm-9jff, GHSA-3mfm-83xf-c92r) - CVSS Score: 9.8 (Critical) / AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vulnerability Details
handlebars@4.7.8 (via ts-jest) contains multiple HIGH/CRITICAL vulnerabilities:
- GHSA-2w6w-674q-4c4q (CRITICAL, CVSS 9.8): JavaScript Injection via AST Type Confusion — allows arbitrary code execution through template compilation
- GHSA-xjpj-3mr7-gcpf (HIGH, CVSS 8.3): JavaScript Injection in CLI Precompiler via Unescaped Names and Options
- GHSA-xhpv-hc6g-r9c6 (HIGH, CVSS 8.1): JavaScript Injection via AST Type Confusion when passing an object as dynamic partial
- GHSA-9cx6-37pm-9jff (HIGH, CVSS 7.5): Denial of Service via Malformed Decorator Syntax in Template Compilation
- GHSA-3mfm-83xf-c92r (HIGH, CVSS 8.1): JavaScript Injection via AST Type Confusion by tampering
@partial-block
Impact on gh-aw-firewall
handlebars is a devDependency used only by ts-jest (test runner). It is not included in the production bundle shipped to users, and is not present in any Docker container images. The practical risk to end users is low, but the vulnerability should be patched to keep CI environments secure and to avoid false positives in security scans.
Remediation Steps
- Recommended Fix: Update
handlebarsto4.7.9vianpm audit fix - Command:
npm audit fix - Status: ✅ Fixed in PR —
handlebarsupdated from4.7.8→4.7.9andbrace-expansionfrom5.0.4→5.0.5(moderate DoS fix)
Testing Required
- All tests pass after update (3 pre-existing failures unrelated to this change)
- No breaking changes detected
-
npm auditreports 0 vulnerabilities after fix
References
Detection Details
- Detected by: Dependency Security Monitor Workflow
- Detection Time: 2026-03-29T01:00:09Z
- Source:
npm audit
Generated by Dependency Security Monitor · ◷
- expires on Apr 28, 2026, 1:03 AM UTC
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
dependenciesPull requests that update a dependency filePull requests that update a dependency filesecurity
Type
Fields
Give feedbackNo fields configured for issues without a type.