Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

chore(deps): update dependency @sveltejs/kit to v2.20.6 [security]#153

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Open
renovate wants to merge1 commit intomain
base:main
Choose a base branch
Loading
fromrenovate/npm-sveltejs-kit-vulnerability

Conversation

@renovate
Copy link
Contributor

@renovaterenovatebot commentedApr 14, 2025
edited
Loading

This PR contains the following updates:

PackageChangeAgeConfidence
@sveltejs/kit (source)2.20.5 ->2.20.6ageconfidence

GitHub Vulnerability Alerts

CVE-2025-32388

Summary

Unsanitized search param names cause XSS vulnerability. You are affected if you iterate over all entries ofevent.url.searchParams inside a serverload function. Attackers can exploit it by crafting a malicious URL and getting a user to click a link with said URL.

Details

SvelteKit tracks which parameters inevent.url.searchParams are read inside serverload functions. If the application iterates over the these parameters, theuses.search_params array included in the boot script (embedded in the server-rendered HTML) will have any search param name included in unsanitized form.

packages/kit/src/runtime/server/utils.js:150 has thestringify_uses(node) function which prints these out.

Reproduction

In a+page.server.js or+layout.server.js:

/** @​type {import('@​sveltejs/kit').Load} */exportfunctionload(event){constvalues={};for(constkeyofevent.url.searchParams.keys()){values[key]=event.url.searchParams.get(key);}}

If a user visits the page in question via a link containing?</script/><script>window.pwned%3D1</script/>, the</script> will be included verbatim in the payload, causing the embedded script to be executed.

It is not necessary to return the parameter value fromload or render it in the page, only to read it (which causes it to be tracked as a dependency) whileload is running.

Impact

Any application that iterates over all values inevent.url.searchParams in aload function in+page.server.js or+layout.server.js (directly or indirectly) is vulnerable to XSS.


Release Notes

sveltejs/kit (@​sveltejs/kit)

v2.20.6

Compare Source

Patch Changes

Configuration

📅Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated byMend Renovate. View therepository job log.

@renovaterenovatebotenabled auto-merge (squash)April 14, 2025 21:55
@renovate
Copy link
ContributorAuthor

Branch automerge failure

This PR was configured for branch automerge. However, this is not possible, so it has been raised as a PR instead.


  • Branch has one or more failed status checks

@renovaterenovatebotforce-pushed therenovate/npm-sveltejs-kit-vulnerability branch 4 times, most recently fromfdbe58f to3031d3bCompareApril 21, 2025 07:07
@renovaterenovatebotforce-pushed therenovate/npm-sveltejs-kit-vulnerability branch 6 times, most recently fromf775efe to563b951CompareMay 4, 2025 17:22
@renovaterenovatebotforce-pushed therenovate/npm-sveltejs-kit-vulnerability branch 9 times, most recently from8e3fc09 to5efd76fCompareMay 11, 2025 21:36
@renovaterenovatebotforce-pushed therenovate/npm-sveltejs-kit-vulnerability branch 4 times, most recently from5e43f44 tobb697a6CompareMay 12, 2025 22:24
@renovaterenovatebotforce-pushed therenovate/npm-sveltejs-kit-vulnerability branch 7 times, most recently from1a7df9a tocd1b259CompareOctober 12, 2025 21:01
@renovaterenovatebotforce-pushed therenovate/npm-sveltejs-kit-vulnerability branch 4 times, most recently from51c4718 to41d82bcCompareOctober 20, 2025 00:26
@renovaterenovatebotforce-pushed therenovate/npm-sveltejs-kit-vulnerability branch 7 times, most recently from8dd6cb9 to9aaa261CompareOctober 27, 2025 01:46
@renovaterenovatebotforce-pushed therenovate/npm-sveltejs-kit-vulnerability branch 4 times, most recently from4b7a24e toea1f73fCompareNovember 3, 2025 02:55
@renovaterenovatebotforce-pushed therenovate/npm-sveltejs-kit-vulnerability branch 3 times, most recently from17fa8f5 to161b438CompareNovember 10, 2025 17:36
@renovaterenovatebotforce-pushed therenovate/npm-sveltejs-kit-vulnerability branch 3 times, most recently from40934f4 tode13458CompareNovember 17, 2025 02:34
@renovaterenovatebotforce-pushed therenovate/npm-sveltejs-kit-vulnerability branch fromde13458 toaf8a828CompareNovember 18, 2025 14:14
Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment

Reviewers

@benjaminstrasserbenjaminstrasserAwaiting requested review from benjaminstrasserbenjaminstrasser is a code owner

@jjnpjjnpAwaiting requested review from jjnpjjnp is a code owner

@mledlmledlAwaiting requested review from mledlmledl is a code owner

@sjaghorisjaghoriAwaiting requested review from sjaghorisjaghori is a code owner

At least 1 approving review is required to merge this pull request.

Assignees

No one assigned

Labels

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

1 participant


[8]ページ先頭

©2009-2025 Movatter.jp