Skip to content

build(deps-dev): bump js-yaml from 4.1.0 to 4.1.1#7

Open
dependabot[bot] wants to merge 1 commit into
mainfrom
dependabot/npm_and_yarn/js-yaml-4.1.1
Open

build(deps-dev): bump js-yaml from 4.1.0 to 4.1.1#7
dependabot[bot] wants to merge 1 commit into
mainfrom
dependabot/npm_and_yarn/js-yaml-4.1.1

Conversation

@dependabot
Copy link
Copy Markdown

@dependabot dependabot Bot commented on behalf of github Nov 15, 2025

Bumps js-yaml from 4.1.0 to 4.1.1.

Changelog

Sourced from js-yaml's changelog.

[4.1.1] - 2025-11-12

Security

  • Fix prototype pollution issue in yaml merge (<<) operator.
Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [js-yaml](https://github.com/nodeca/js-yaml) from 4.1.0 to 4.1.1.
- [Changelog](https://github.com/nodeca/js-yaml/blob/master/CHANGELOG.md)
- [Commits](nodeca/js-yaml@4.1.0...4.1.1)

---
updated-dependencies:
- dependency-name: js-yaml
  dependency-version: 4.1.1
  dependency-type: direct:development
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot Bot added dependencies Pull requests that update a dependency file javascript Pull requests that update javascript code labels Nov 15, 2025
@ibcheckmarx
Copy link
Copy Markdown

Logo
Checkmarx One – Scan Summary & Detailsf0b3851b-0974-481a-9091-f441134ba64a

New Issues (19)

Checkmarx found the following issues in this Pull Request

Severity Issue Source File / Package Checkmarx Insight
HIGH CVE-2021-3807 Npm-ansi-regex-2.1.1
detailsRecommended version: 3.0.1
Description: The package ansi-regex versions 3.x prior to 3.0.1, 4.x prior to 4.1.1, 5.x prior to 5.0.1 and 6.0.x prior to 6.0.1 is vulnerable to Inefficient Re...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: nNs1MIovnHzRoF2CfsvPn9sHemoIkBFTJXQgyPEBIuI%3D
Vulnerable Package
HIGH CVE-2024-21538 Npm-cross-spawn-7.0.3
detailsRecommended version: 7.0.5
Description: Versions of the package cross-spawn prior to 6.0.6 and 7.x prior to 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS), due to im...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: MLby6XCB3pnaWaiRIH3miVp%2BvesuaEQwBSY%2FiBTgM%2Bs%3D
Vulnerable Package
HIGH CVE-2024-4068 Npm-braces-3.0.2
detailsRecommended version: 3.0.3
Description: The NPM package "braces", versions prior to 3.0.3, fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. In...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: l4TtgY6vbD9%2FB3NjyCE1zg9faDe2Ra3gz3dn%2BBP1Mt8%3D
Vulnerable Package
HIGH Cxdca8e59f-8bfe Npm-inflight-1.0.6
detailsDescription: In NPM `inflight` there is a Memory Leak because some resources are not freed correctly after being used. It appears to affect all versions, as the...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: 3X1ZE37bhbrJsgrCLfV4KjsFvUct2t%2Blt68sMLGtaLo%3D
Vulnerable Package
MEDIUM CVE-2024-24758 Npm-undici-5.28.2
detailsRecommended version: 5.29.0
Description: Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici already cleared Authorization headers on cross-origin redirects, but did not...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: Wgz%2BQ4GBZ91PU6WujOcIiCoEx5UYtMHxONy89DvtlCs%3D
Vulnerable Package
MEDIUM CVE-2024-30260 Npm-undici-5.28.2
detailsRecommended version: 5.29.0
Description: Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici cleared Authorization and Proxy-Authorization headers for `fetch()`, but did...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: GhxRgr4CLgE0GOmNKK291u7JBeGv%2Bc6aYFZD7%2F4Iw7k%3D
Vulnerable Package
MEDIUM CVE-2024-4067 Npm-micromatch-4.0.5
detailsRecommended version: 4.0.8
Description: The NPM package "micromatch" prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in "micromatch....
Attack Vector: NETWORK
Attack Complexity: LOW

ID: uObsrD7xIJXmEiciNk0XjmR9OBRHWIfPnpiTEuYeiWw%3D
Vulnerable Package
MEDIUM CVE-2025-22150 Npm-undici-5.28.2
detailsRecommended version: 5.29.0
Description: Undici is an HTTP/1.1 client. In affected versions, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is kno...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: cLjXj8IVkCOLIXjTXKQ2mYSYAhjnZuGGSpu35jWbwqw%3D
Vulnerable Package
MEDIUM CVE-2025-25288 Npm-@octokit/plugin-paginate-rest-6.1.2
detailsRecommended version: 9.2.2
Description: The package @octokit/plugin-paginate-rest is the Octokit plugin to paginate REST API endpoint responses. In versions through 9.2.1 and 9.3.0-beta.1...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: DNTUMl59tX5KZBahM%2BG%2FBm%2F9NS%2F%2BDYW0fUlRym6BE9I%3D
Vulnerable Package
MEDIUM CVE-2025-25289 Npm-@octokit/request-error-3.0.3
detailsRecommended version: 5.1.1
Description: The package @octokit/request-error is an error class for Octokit request errors. A Regular Expression Denial of Service (ReDoS) vulnerability exist...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: BQufEM%2FZUxJ9rIga7fLDQCd9Hha%2B6DZT9sl3pSCbrhg%3D
Vulnerable Package
MEDIUM CVE-2025-25290 Npm-@octokit/request-6.2.8
detailsRecommended version: 8.4.1
Description: @octokit/request sends parameterized requests to GitHub's APIs with sensible defaults in browsers and Node. Starting in versions 1.0.0 through 8.4....
Attack Vector: NETWORK
Attack Complexity: LOW

ID: E0riao94rx%2FcN0l3p8jrKu0WOS0GBpGMhW2msOD3G9E%3D
Vulnerable Package
MEDIUM CVE-2025-27789 Npm-@babel/helpers-7.23.9
detailsRecommended version: 7.26.10
Description: Babel is a compiler for writing next-generation JavaScript. In affected versions of Babel, to compile regular expressions named capturing groups, B...
Attack Vector: LOCAL
Attack Complexity: LOW

ID: QsnIUzlUO81IEylXZO%2Bq5HFOlrF1h0g8NHitemWBi%2FE%3D
Vulnerable Package
LOW CVE-2024-30261 Npm-undici-5.28.2
detailsRecommended version: 5.29.0
Description: Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the 'integrity' option passed to 'fetch()', allowing 'fetch()...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: tZWlbYTD2FAny6A6tWJAeXujSKM0%2F32TudavyzGbyS8%3D
Vulnerable Package
LOW CVE-2025-47279 Npm-undici-5.28.2
detailsRecommended version: 5.29.0
Description: Undici is an HTTP/1.1 client for Node.js. In versions prior to 5.29.0, 6.x prior to 6.21.2, and 7.x prior to 7.5.0, applications that use undici to...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: GCm0o2rGq%2F%2BrYS4zaFWcedAMiHhlgzaZBJWbvs1Thto%3D
Vulnerable Package
LOW CVE-2025-5889 Npm-brace-expansion-2.0.1
detailsRecommended version: 2.0.2
Description: A vulnerability was found in juliangruber brace-expansion. It has been rated as problematic. Affected by this issue is the function "expand" of the...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: mQReTue21sf%2BI2zApPHmhDKVpvW1wox1JiTF6YpJOVQ%3D
Vulnerable Package
LOW CVE-2025-5889 Npm-brace-expansion-1.1.11
detailsRecommended version: 1.1.12
Description: A vulnerability was found in juliangruber brace-expansion. It has been rated as problematic. Affected by this issue is the function "expand" of the...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: Xnuo1zZfh%2Fr4%2F34BsyIC6ZCbQLjFMWYYdlyoPlgY%2FnQ%3D
Vulnerable Package
LOW Cx8bc4df28-fcf5 Npm-debug-3.2.7
detailsRecommended version: 4.4.0
Description: In NPM "debug" versions prior to 4.4.0, the "enable" function accepts a regular expression from user input without escaping it. Arbitrary regular e...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: AKELQ19gaHdLhAWZ7H0gI9xLXFNNU7p1lnarfKsRIq0%3D
Vulnerable Package
LOW Cx8bc4df28-fcf5 Npm-debug-4.3.4
detailsRecommended version: 4.4.0
Description: In NPM "debug" versions prior to 4.4.0, the "enable" function accepts a regular expression from user input without escaping it. Arbitrary regular e...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: uiyX0e0h5Dt2jJN34Ih3SmUNgfsi37GMHVtw%2FwZolME%3D
Vulnerable Package
LOW Unpinned Actions Full Length Commit SHA /test.yml: 152
detailsPinning an action to a full length commit SHA is currently the only way to use an action as an immutable release. Pinning to a particular SHA help...
ID: tQQOkY5NzYQYeezcqHCFdOIFvi0%3D

Use @Checkmarx to reach out to us for assistance.

Just send a PR comment with @Checkmarx followed by a natural language request.

Examples: @Checkmarx how are you able to help me? @Checkmarx rescan this PR

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file javascript Pull requests that update javascript code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant