Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vulnerability Found in Yoast SEO Packages Under JS (ua-parser-js) - CVE-2022-25927 #21972

Open
ShreyasGeotab opened this issue Jan 17, 2025 · 0 comments

Comments

@ShreyasGeotab
Copy link

Vulnerability Details:

Vulnerability IDs: CVE-2022-25927 (NVD)
Highest Severity: HIGH
CVE Count: 1
Confidence: HIGHEST
Evidence Count: 3
Identifiers: pkg:javascript/[email protected]
CVSS Scores and Vectors:

Base Score: HIGH (7.5)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWEs: CWE-1333
Vulnerability Description: The vulnerability arises from the ua-parser package, which is used in the Yoast SEO package JS. This issue is indirectly caused by the archived and no longer maintained draft-js dependency. Specifically, versions of the package from 0.7.30 and before 0.7.33, and from 0.8.1 and before 1.0.33 are vulnerable to Regular Expression Denial of Service (ReDoS) via the trim() function.

Request for Action:

  1. Given that draft-js is archived and no longer maintained, is there a plan to replace this dependency with a more secure and actively maintained alternative?
  2. Can the draft-js dependency be replaced to mitigate this vulnerability?
  3. Is anything in development or in the pipeline to address this issue? If so, do you have an estimated timeline for when a fix or patch will be available?
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant