Vulnerable Library - postcss-8.4.31.tgz
Library home page: https://registry.npmjs.org/postcss/-/postcss-8.4.31.tgz
Path to dependency file: /src/main/vue/package.json
Path to vulnerable library: /src/main/vue/package.json
Found in HEAD commit: de4579e3eb742e6069649be650bd2841e1ec1383
Vulnerabilities
| Vulnerability |
Severity |
CVSS |
Dependency |
Type |
Fixed in (postcss version) |
Remediation Possible** |
| CVE-2026-41305 |
Medium |
6.1 |
postcss-8.4.31.tgz |
Direct |
8.5.10 |
❌ |
| CVE-2024-55565 |
Medium |
4.3 |
nanoid-3.3.6.tgz |
Transitive |
8.4.32 |
❌ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2026-41305
Vulnerable Library - postcss-8.4.31.tgz
Library home page: https://registry.npmjs.org/postcss/-/postcss-8.4.31.tgz
Path to dependency file: /src/main/vue/package.json
Path to vulnerable library: /src/main/vue/package.json
Dependency Hierarchy:
- ❌ postcss-8.4.31.tgz (Vulnerable Library)
Found in HEAD commit: de4579e3eb742e6069649be650bd2841e1ec1383
Found in base branch: main
Vulnerability Details
PostCSS takes a CSS file and provides an API to analyze and modify its rules by transforming the rules into an Abstract Syntax Tree. Versions prior to 8.5.10 do not escape "</style>" sequences when stringifying CSS ASTs. When user-submitted CSS is parsed and re-stringified for embedding in HTML "<style>" tags, "</style>" in CSS values breaks out of the style context, enabling XSS. Version 8.5.10 fixes the issue.
Publish Date: 2026-04-24
URL: CVE-2026-41305
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: GHSA-qx2v-qp2m-jg93
Release Date: 2026-04-24
Fix Resolution: 8.5.10
Step up your Open Source Security Game with Mend here
CVE-2024-55565
Vulnerable Library - nanoid-3.3.6.tgz
Library home page: https://registry.npmjs.org/nanoid/-/nanoid-3.3.6.tgz
Path to dependency file: /src/main/vue/package.json
Path to vulnerable library: /src/main/vue/package.json
Dependency Hierarchy:
- postcss-8.4.31.tgz (Root Library)
- ❌ nanoid-3.3.6.tgz (Vulnerable Library)
Found in HEAD commit: de4579e3eb742e6069649be650bd2841e1ec1383
Found in base branch: main
Vulnerability Details
nanoid (aka Nano ID) before 5.0.9 mishandles non-integer values. 3.3.8 is also a fixed version.
Publish Date: 2024-12-09
URL: CVE-2024-55565
CVSS 3 Score Details (4.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2024-55565
Release Date: 2024-12-09
Fix Resolution (nanoid): 3.3.8
Direct dependency fix Resolution (postcss): 8.4.32
Step up your Open Source Security Game with Mend here
Library home page: https://registry.npmjs.org/postcss/-/postcss-8.4.31.tgz
Path to dependency file: /src/main/vue/package.json
Path to vulnerable library: /src/main/vue/package.json
Found in HEAD commit: de4579e3eb742e6069649be650bd2841e1ec1383
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
Vulnerable Library - postcss-8.4.31.tgz
Library home page: https://registry.npmjs.org/postcss/-/postcss-8.4.31.tgz
Path to dependency file: /src/main/vue/package.json
Path to vulnerable library: /src/main/vue/package.json
Dependency Hierarchy:
Found in HEAD commit: de4579e3eb742e6069649be650bd2841e1ec1383
Found in base branch: main
Vulnerability Details
PostCSS takes a CSS file and provides an API to analyze and modify its rules by transforming the rules into an Abstract Syntax Tree. Versions prior to 8.5.10 do not escape "</style>" sequences when stringifying CSS ASTs. When user-submitted CSS is parsed and re-stringified for embedding in HTML "<style>" tags, "</style>" in CSS values breaks out of the style context, enabling XSS. Version 8.5.10 fixes the issue.
Publish Date: 2026-04-24
URL: CVE-2026-41305
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: GHSA-qx2v-qp2m-jg93
Release Date: 2026-04-24
Fix Resolution: 8.5.10
Step up your Open Source Security Game with Mend here
Vulnerable Library - nanoid-3.3.6.tgz
Library home page: https://registry.npmjs.org/nanoid/-/nanoid-3.3.6.tgz
Path to dependency file: /src/main/vue/package.json
Path to vulnerable library: /src/main/vue/package.json
Dependency Hierarchy:
Found in HEAD commit: de4579e3eb742e6069649be650bd2841e1ec1383
Found in base branch: main
Vulnerability Details
nanoid (aka Nano ID) before 5.0.9 mishandles non-integer values. 3.3.8 is also a fixed version.
Publish Date: 2024-12-09
URL: CVE-2024-55565
CVSS 3 Score Details (4.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2024-55565
Release Date: 2024-12-09
Fix Resolution (nanoid): 3.3.8
Direct dependency fix Resolution (postcss): 8.4.32
Step up your Open Source Security Game with Mend here