Skip to content

chore(frontend): [release-2.8] dismiss 3 @remix-run/* HIGH vulns missed by #2413#2414

Merged
malinskibeniamin merged 1 commit intorelease-2.8from
chore/snyk-sweep-2026-04-22-v2.8-remix
Apr 22, 2026
Merged

chore(frontend): [release-2.8] dismiss 3 @remix-run/* HIGH vulns missed by #2413#2414
malinskibeniamin merged 1 commit intorelease-2.8from
chore/snyk-sweep-2026-04-22-v2.8-remix

Conversation

@malinskibeniamin
Copy link
Copy Markdown
Contributor

Summary

Follow-up to merged PR #2413. That sweep dismissed 4 HIGH-severity Snyk findings (SNYK-JS-LODASH-15869625 + 3 undici IDs) but missed 3 additional HIGH-severity findings that share the exact same unreachable dep chain:

  • SNYK-JS-REMIXRUNNODE-14908858 — Directory Traversal
  • SNYK-JS-REMIXRUNROUTER-14908287 — Open Redirect
  • SNYK-JS-REMIXRUNROUTER-14908530 — Cross-site Scripting (XSS)

All three are pulled in via @tanstack/react-form's optional /start SSR utility. grep -rn "@tanstack/react-form/start\|@remix-run" frontend/src returns zero hits — the frontend is a browser-only Module Federation remote and never imports the /start subpath. The vulnerable server-side code is never loaded or executed.

Each dismissal includes a reachability analysis in frontend/.snyk with expires: 2027-04-22.

Verification

  • snyk test --file=yarn.lock --severity-threshold=high — "no vulnerable paths found"
  • Scope: only frontend/.snyk touched (+33 / -0)

cc @redpanda-data/ux-console

…bility analysis

The original sweep covered SNYK-JS-LODASH-15869625 (CVE-2026-4800) plus 3
undici WebSocket advisories, but missed the 3 remaining HIGH severity
findings that share the same unreachable dep chain:

- SNYK-JS-REMIXRUNNODE-14908858 (Directory Traversal)
- SNYK-JS-REMIXRUNROUTER-14908287 (Open Redirect)
- SNYK-JS-REMIXRUNROUTER-14908530 (XSS)

All three are pulled in via @tanstack/react-form's optional /start SSR
utility. frontend/src only imports the browser entry of
@tanstack/react-form, never the /start subpath. The vulnerable server-
side code is never loaded or executed in this browser-only Module
Federation remote. Same reasoning as the existing undici dismissals.

Verified via `snyk test --file=yarn.lock --severity-threshold=high`:
"no vulnerable paths found".

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
@malinskibeniamin malinskibeniamin added security Pull requests that address a security vulnerability dependencies labels Apr 22, 2026
@malinskibeniamin malinskibeniamin merged commit 63d3c9a into release-2.8 Apr 22, 2026
9 of 10 checks passed
@malinskibeniamin malinskibeniamin deleted the chore/snyk-sweep-2026-04-22-v2.8-remix branch April 22, 2026 15:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies security Pull requests that address a security vulnerability

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant