-
Notifications
You must be signed in to change notification settings - Fork 13
astro-5.16.15.tgz: 1 vulnerabilities (highest severity is: 7.5) #71
Description
Vulnerable Library - astro-5.16.15.tgz
Path to dependency file: /docs/package.json
Path to vulnerable library: /docs/package.json,/docs/starlight-docs/package.json
Found in HEAD commit: ec994c1a9bf5ae33c1721ef3568d20d917573751
Vulnerabilities
| Vulnerability | Severity | Dependency | Type | Fixed in (astro version) | Remediation Possible** | |
|---|---|---|---|---|---|---|
| CVE-2026-33128 | 7.5 | h3-1.15.5.tgz | Transitive | N/A* | ❌ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2026-33128
Vulnerable Library - h3-1.15.5.tgz
Minimal H(TTP) framework built for high performance and portability.
Library home page: https://registry.npmjs.org/h3/-/h3-1.15.5.tgz
Path to dependency file: /docs/package.json
Path to vulnerable library: /docs/package.json,/docs/starlight-docs/package.json
Dependency Hierarchy:
- astro-5.16.15.tgz (Root Library)
- unstorage-1.17.4.tgz
- ❌ h3-1.15.5.tgz (Vulnerable Library)
- unstorage-1.17.4.tgz
Found in HEAD commit: ec994c1a9bf5ae33c1721ef3568d20d917573751
Found in base branch: main
Vulnerability Details
H3 is a minimal H(TTP) framework. In versions prior to 1.15.6 and between 2.0.0 through 2.0.1-rc.14, createEventStream is vulnerable to Server-Sent Events (SSE) injection due to missing newline sanitization in formatEventStreamMessage() and formatEventStreamComment(). An attacker who controls any part of an SSE message field (id, event, data, or comment) can inject arbitrary SSE events to connected clients. This issue is fixed in versions 1.15.6 and 2.0.1-rc.15.
Publish Date: 2026-03-20
URL: CVE-2026-33128
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: High
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Release Date: 2026-03-18
Fix Resolution: https://github.com/h3js/h3.git - v1.15.6,https://github.com/h3js/h3.git - v2.0.1-rc.15