fix: bump js-yaml to 4.1.1 to fix CVE-2025-64718#235
Merged
Conversation
|
alexander-rw
approved these changes
May 22, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
CVE-2025-64718 - js-yaml Prototype Pollution
Issue: COM-188
Summary
Fixes CVE-2025-64718 in the
js-yamlpackage (versions ≥ 4.0.0, < 4.1.1).CVE: CVE-2025-64718 / GHSA-mh29-5h37-fv8m
CVSS Score: 5.3 (Medium)
Affected Package: npm-js-yaml >= 4.0.0, < 4.1.1
Fixed in: 4.1.1
SLA Deadline: 2026-05-29T18:11:52.722Z
Vulnerability Details
js-yamlversions ≥ 4.0.0 and < 4.1.1 allow an attacker who controls the content of a parsed YAML document to polluteObject.prototypevia a__proto__key. This can silently alter the behavior of all plain objects in the Node.js process — potentially enabling unauthorized property access, bypassing security checks, or causing denial of service.Risk Assessment
Risk is low —
js-yamlis a dev-only, transitive dependency with zero production surface. It is only installed as a transitive dependency ofmocha(test runner) andeslint(linter). The vulnerability is only reachable during local development or CI when running tests or linting.Changes
overridesentry inpackage.jsonto pinjs-yamlto version 4.1.1package-lock.jsonwith the patched versionReferences