CVE-2024-11831

Source
https://cve.org/CVERecord?id=CVE-2024-11831
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-11831.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-11831
Aliases
Downstream
Related
Published
2025-02-10T16:15:37.080Z
Modified
2026-02-04T02:38:01.563225Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A flaw was found in npm-serialize-javascript. The vulnerability occurs because the serialize-javascript module does not properly sanitize certain inputs, such as regex or other JavaScript object types, allowing an attacker to inject malicious code. This code could be executed when deserialized by a web browser, causing Cross-site scripting (XSS) attacks. This issue is critical in environments where serialized data is sent to web clients, potentially compromising the security of the website or web application using this package.

References

Affected packages

Git / github.com/yahoo/serialize-javascript

Affected ranges

Type
GIT
Repo
https://github.com/yahoo/serialize-javascript
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*
v1.0.0
v1.1.0
v1.1.1
v1.1.2
v1.2.0
v1.3.0
v1.4.0
v1.5.0
v1.6.0
v1.6.1
v1.7.0
v1.8.0
v1.9.0
v1.9.1
v2.*
v2.0.0
v2.1.0
v2.1.1
v2.1.2
v3.*
v3.0.0
v3.1.0
v4.*
v4.0.0
v5.*
v5.0.0
v5.0.1
v6.*
v6.0.0
v6.0.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-11831.json"