First published: Tue Jan 30 2024(Updated: )
## impact The `@urql/next` package is vulnerable to XSS. To exploit this an attacker would need to ensure that the response returns `html` tags and that the web-application is using streamed responses (non-RSC). This vulnerability is due to improper escaping of html-like characters in the response-stream. To fix this vulnerability upgrade to version 1.1.1
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/@urql/next | <1.1.1 | 1.1.1 |
Nearform Urql | <1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24556 has been classified as a high severity vulnerability due to its potential for cross-site scripting (XSS) attacks.
To fix CVE-2024-24556, update the @urql/next package to version 1.1.1 or later.
CVE-2024-24556 is caused by improper escaping of HTML-like characters in the @urql/next package.
Versions of the @urql/next package prior to 1.1.1 are affected by CVE-2024-24556.
Exploiting CVE-2024-24556 can allow an attacker to execute arbitrary JavaScript in the context of the user’s browser.