TokenTalks
TokenTalks
U

Token Stream

SecurityFixGitHub Security Advisory · 2d ago

Breaking change:

[CRITICAL] GHSA-6xwp-cp5h-q856: Malicious code in @beproduct/nestjs-auth (0.1.2 through 0.1.19) — Mini Shai-Hulud worm

GHSA-6xwp-cp5h-q856: Malicious code in @beproduct/nestjs-auth (0.1.2 through 0.1.19) — Mini Shai-Hulud worm

Why it mattersApps using @beproduct/nestjs-auth will need code changes before upgrading. Review the release notes before bumping versions.

Who should careEngineers depending on @beproduct/nestjs-auth.

View source ↗ github.com
SecurityFixGitHub Security Advisory · 2d ago

Security patch:

[LOW] GHSA-g8wj-3cr3-6w7v: Nuxt: `__nuxt_island` endpoint does not bind responses to request props, enabling shared-cache poisoning

GHSA-g8wj-3cr3-6w7v: Nuxt: `__nuxt_island` endpoint does not bind responses to request props, enabling shared-cache…

Why it mattersA security vulnerability was patched. Upgrade affected versions to mitigate risk.

Who should careAnyone running affected versions in production.

View source ↗ github.com
SecurityFixGitHub Security Advisory · 2d ago

Security patch:

[MODERATE] GHSA-62q4-447f-wv8h: Regression in pymdownx.snippets reintroduces sibling-prefix path traversal bypass despite restrict_base_path

GHSA-62q4-447f-wv8h: Regression in pymdownx.snippets reintroduces sibling-prefix path traversal bypass despite…

Why it mattersA security vulnerability was patched. Upgrade affected versions to mitigate risk.

Who should careAnyone running affected versions in production.

View source ↗ github.com
SecurityFixGitHub Security Advisory · 2d ago

New capability:

[HIGH] GHSA-22qr-rp27-j9wm: PenPot MCP REPL server binds to 0.0.0.0 with unauthenticated /execute endpoint — RCE

GHSA-22qr-rp27-j9wm: PenPot MCP REPL server binds to 0.0.0.0 with unauthenticated /execute endpoint — RCE

Why it mattersNew functionality is available in @penpot/mcp. May enable simpler implementations or replace external dependencies.

Who should careTeams already using @penpot/mcp or evaluating it.

View source ↗ github.com
SecurityFixGitHub Security Advisory · 2d ago

Breaking change:

[HIGH] GHSA-7xpr-hc2w-34m9: Wire: skipGroup() missing negative-length check allows 10-byte payload to crash any Wire-decoding service

GHSA-7xpr-hc2w-34m9: Wire: skipGroup() missing negative-length check allows 10-byte payload to crash any Wire-decoding…

Why it mattersApps using com.squareup.wire:wire-runtime will need code changes before upgrading. Review the release notes before bumping versions.

Who should careEngineers depending on com.squareup.wire:wire-runtime.

View source ↗ github.com
SecurityFixGitHub Security Advisory · 2d ago

Update:

[CRITICAL] GHSA-g53w-w6mj-hrpp: MCP Gateway: Authority-injection and JWT/session bypass via the unauthenticated router hair-pin "router-key" / "mcp-init-host" path

GHSA-g53w-w6mj-hrpp: MCP Gateway: Authority-injection and JWT/session bypass via the unauthenticated router hair-pin…

Why it mattersgithub.com/kuadrant/mcp-gateway released an update. Review the changelog for relevant changes.

Who should careTeams using github.com/kuadrant/mcp-gateway.

View source ↗ github.com
SecurityFixGitHub Security Advisory · 2d ago

Security patch:

[MODERATE] GHSA-m23h-6mwm-39m8: Kong Ingress Controller for Kubernetes (KIC): Cross-namespace TLS Secret Exfiltration in Gateways with GatewayClass missing `konghq.com/gatewayclass-unmanaged: 'true'` annotation

GHSA-m23h-6mwm-39m8: Kong Ingress Controller for Kubernetes (KIC): Cross-namespace TLS Secret Exfiltration in Gateways…

Why it mattersA security vulnerability was patched. Upgrade affected versions to mitigate risk.

Who should careAnyone running affected versions in production.

View source ↗ github.com