Skip to content

Conversation

@depfu
Copy link
Contributor

@depfu depfu bot commented Aug 28, 2025


๐Ÿšจ Your current dependencies have known security vulnerabilities ๐Ÿšจ

This dependency update fixes known security vulnerabilities. Please see the details below and assess their impact carefully. We recommend to merge and deploy this as soon as possible!


Here is everything you need to know about this upgrade. Please take a good look at what changed and the test results before merging this pull request.

What changed?

โœณ๏ธ gatsby-transformer-remark (2.16.1 โ†’ 6.15.0) ยท Repo ยท Changelog

Security Advisories ๐Ÿšจ

๐Ÿšจ gatsby-transformer-remark has possible unsanitized JavaScript code injection

Impact

The gatsby-transformer-remark plugin prior to versions 5.25.1 and 6.3.2 passes input through to the gray-matter npm package, which is vulnerable to JavaScript injection in its default configuration, unless input is sanitized. The vulnerability is present in gatsby-transformer-remark when passing input in data mode (querying MarkdownRemark nodes via GraphQL). Injected JavaScript executes in the context of the build server.

To exploit this vulnerability untrusted/unsanitized input would need to be sourced by or added into a file processed by gatsby-transformer-remark. The following payload demonstrates a vulnerable configuration:

---js
((require("child_process")).execSync("id >> /tmp/rce"))
--- 

Patches

A patch has been introduced in [email protected] and [email protected] which mitigates the issue by disabling the gray-matter JavaScript Frontmatter engine. The patch introduces a new option, JSFrontmatterEngine which is set to false by default. When setting JSFrontmatterEngine to true, input passed to gatsby-plugin-mdx must be sanitized before processing to avoid a security risk. Warnings are displayed when enabling JSFrontmatterEngine to true or if it appears that the MarkdownRemark input is attempting to use the Frontmatter engine.

Workarounds

If an older version of gatsby-transformer-remark must be used, input passed into the plugin should be sanitized ahead of processing.

We encourage projects to upgrade to the latest major release branch for all Gatsby plugins to ensure the latest security updates and bug fixes are received in a timely manner.

For more information

Email us at [email protected].

๐Ÿšจ gatsby-transformer-remark has possible unsanitized JavaScript code injection

Impact

The gatsby-transformer-remark plugin prior to versions 5.25.1 and 6.3.2 passes input through to the gray-matter npm package, which is vulnerable to JavaScript injection in its default configuration, unless input is sanitized. The vulnerability is present in gatsby-transformer-remark when passing input in data mode (querying MarkdownRemark nodes via GraphQL). Injected JavaScript executes in the context of the build server.

To exploit this vulnerability untrusted/unsanitized input would need to be sourced by or added into a file processed by gatsby-transformer-remark. The following payload demonstrates a vulnerable configuration:

---js
((require("child_process")).execSync("id >> /tmp/rce"))
--- 

Patches

A patch has been introduced in [email protected] and [email protected] which mitigates the issue by disabling the gray-matter JavaScript Frontmatter engine. The patch introduces a new option, JSFrontmatterEngine which is set to false by default. When setting JSFrontmatterEngine to true, input passed to gatsby-plugin-mdx must be sanitized before processing to avoid a security risk. Warnings are displayed when enabling JSFrontmatterEngine to true or if it appears that the MarkdownRemark input is attempting to use the Frontmatter engine.

Workarounds

If an older version of gatsby-transformer-remark must be used, input passed into the plugin should be sanitized ahead of processing.

We encourage projects to upgrade to the latest major release branch for all Gatsby plugins to ensure the latest security updates and bug fixes are received in a timely manner.

For more information

Email us at [email protected].

โ†—๏ธ hast-to-hyperscript (indirect, 5.0.0 โ†’ 9.0.1) ยท Repo

Release Notes

9.0.1

9.0.0

  • 22c7855 Add types
    (breaking, potentially, if you or your dependents use typescript)

8.1.1

  • 8ff34e9 Fix to specify minimum needed property-information version

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

โ†—๏ธ hast-util-from-parse5 (indirect, 4.0.2 โ†’ 6.0.1) ยท Repo

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

โ†—๏ธ hast-util-raw (indirect, 4.0.0 โ†’ 6.1.0) ยท Repo

Release Notes

6.1.0

  • f64e56f Add support for options.passThrough

6.0.2

  • 84a8113 Fix to reset parser before correct elements, etc

6.0.1

  • 74b03c0 Fix support for template elements

6.0.0

  • 6e3146f Update dependencies
  • e21922d Add types
    (breaking, potentially, if you or your dependents use typescript)

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

โ†—๏ธ hast-util-to-html (indirect, 4.0.1 โ†’ 7.1.3) ยท Repo

Release Notes

7.1.3

  • e26628c Fix SVG attributes on svg element in HTML

7.1.2

  • 0116d07 Refactor to improve bundle size

7.1.1

  • 0dc5101 types: make optional fields optional

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

โ†—๏ธ hastscript (indirect, 4.1.0 โ†’ 6.0.0) ยท Repo

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

โ†—๏ธ mdast-util-definitions (indirect, 1.2.5 โ†’ 4.0.0) ยท Repo

Release Notes

4.0.0

  • 24fd914 Change to match CommonMark

3.0.1

  • 04d142e Move mdast types to dev dependency

3.0.0

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

โ†—๏ธ mdast-util-to-hast (indirect, 3.0.4 โ†’ 10.2.0) ยท Repo

Release Notes

10.2.0

  • c339702 Add mdast code.meta to hast as code.data.meta

10.1.1

  • 703a652 Fix exception on node.data set to undefined

10.1.0

  • a497990 Add passThrough option to keep custom nodes

10.0.1

  • 197247c Fix support for hName on non-element

10.0.0

9.1.2

  • c3e033d Fix support for tables w/o align
  • 84c85f7 Fix to not add a tbody if there is one row

9.1.1

  • 11dad16 Fix line endings in tight list items
  • 15a21f1 Fix multiple line endings in text
  • 914a6b7 Fix tabs in code
  • 96a1161 Fix whitespace in inline code
  • 18e5051 Add docs on align

9.1.0

  • 960a349 types: add subtypes as direct dependencies

9.0.1

  • 3e30b29 Move mdast types to dev dependencies

9.0.0

  • 345e61c Add types
    (breaking, potentially, if you or your dependents use typescript)

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

โ†—๏ธ property-information (indirect, 4.2.0 โ†’ 5.6.0) ยท Repo

Release Notes

5.6.0

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

โ†—๏ธ remark-retext (indirect, 3.1.3 โ†’ 4.0.0) ยท Repo

Release Notes

4.0.0

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

โ†—๏ธ sanitize-html (indirect, 1.27.5 โ†’ 2.17.0) ยท Repo ยท Changelog

Security Advisories ๐Ÿšจ

๐Ÿšจ sanitize-html Information Exposure vulnerability

Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could exploit this vulnerability to gather details about the file system structure and dependencies of the targeted server.

๐Ÿšจ Sanitize-html Vulnerable To REDoS Attacks

The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment removal.

๐Ÿšจ Improper Input Validation in sanitize-html

Apostrophe Technologies sanitize-html before 2.3.1 does not properly handle internationalized domain name (IDN) which could allow an attacker to bypass hostname whitelist validation set by the "allowedIframeHostnames" option.

๐Ÿšจ Improper Input Validation in sanitize-html

Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the "allowedIframeHostnames" option when the "allowIframeRelativeUrls" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with "/\example.com".

Release Notes

Too many releases to show here. View the full release notes.

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

โ†—๏ธ unist-builder (indirect, 1.0.4 โ†’ 2.0.3) ยท Repo

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

โ†—๏ธ unist-util-select (indirect, 1.5.0 โ†’ 3.0.4) ยท Repo

Release Notes

3.0.4

  • 5da284c Remove circular dependency

3.0.3

3.0.2

Does any of this look wrong? Please let us know.

Commits

See the full diff on Github. The new version differs by more commits than we can show here.

๐Ÿ†• @โ€‹lmdb/lmdb-darwin-arm64 (added, 2.5.3)

๐Ÿ†• @โ€‹lmdb/lmdb-darwin-x64 (added, 2.5.3)

๐Ÿ†• @โ€‹lmdb/lmdb-linux-arm (added, 2.5.3)

๐Ÿ†• @โ€‹lmdb/lmdb-linux-arm64 (added, 2.5.3)

๐Ÿ†• @โ€‹lmdb/lmdb-linux-x64 (added, 2.5.3)

๐Ÿ†• @โ€‹lmdb/lmdb-win32-x64 (added, 2.5.3)

๐Ÿ†• @โ€‹msgpackr-extract/msgpackr-extract-darwin-arm64 (added, 3.0.3)

๐Ÿ†• @โ€‹msgpackr-extract/msgpackr-extract-darwin-x64 (added, 3.0.3)

๐Ÿ†• @โ€‹msgpackr-extract/msgpackr-extract-linux-arm (added, 3.0.3)

๐Ÿ†• @โ€‹msgpackr-extract/msgpackr-extract-linux-arm64 (added, 3.0.3)

๐Ÿ†• @โ€‹msgpackr-extract/msgpackr-extract-linux-x64 (added, 3.0.3)

๐Ÿ†• @โ€‹msgpackr-extract/msgpackr-extract-win32-x64 (added, 3.0.3)

๐Ÿ†• @โ€‹types/cacheable-request (added, 6.0.3)

๐Ÿ†• @โ€‹types/http-cache-semantics (added, 4.0.4)

๐Ÿ†• @โ€‹types/keyv (added, 3.1.4)

๐Ÿ†• @โ€‹types/parse5 (added, 5.0.3)

๐Ÿ†• @โ€‹types/responselike (added, 1.0.3)

๐Ÿ†• cacheable-lookup (added, 5.0.4)

๐Ÿ†• deepmerge (added, 4.3.1)

๐Ÿ†• hash-wasm (added, 4.12.0)

๐Ÿ†• http2-wrapper (added, 1.0.3)

๐Ÿ†• lmdb (added, 2.5.3)

๐Ÿ†• mdast-util-find-and-replace (added, 1.1.1)

๐Ÿ†• mdast-util-footnote (added, 0.1.7)

๐Ÿ†• mdast-util-gfm (added, 0.1.2)

๐Ÿ†• mdast-util-gfm-autolink-literal (added, 0.1.3)

๐Ÿ†• mdast-util-gfm-strikethrough (added, 0.2.3)

๐Ÿ†• mdast-util-gfm-table (added, 0.1.6)

๐Ÿ†• mdast-util-gfm-task-list-item (added, 0.1.6)

๐Ÿ†• micromark-extension-footnote (added, 0.3.2)

๐Ÿ†• micromark-extension-gfm (added, 0.3.3)

๐Ÿ†• micromark-extension-gfm-autolink-literal (added, 0.5.7)

๐Ÿ†• micromark-extension-gfm-strikethrough (added, 0.6.5)

๐Ÿ†• micromark-extension-gfm-table (added, 0.4.3)

๐Ÿ†• micromark-extension-gfm-tagfilter (added, 0.3.0)

๐Ÿ†• micromark-extension-gfm-task-list-item (added, 0.3.3)

๐Ÿ†• msgpackr (added, 1.11.5)

๐Ÿ†• msgpackr-extract (added, 3.0.3)

๐Ÿ†• nanoid (added, 3.3.11)

๐Ÿ†• node-gyp-build-optional-packages (added, 5.0.3)

๐Ÿ†• not (added, 0.1.0)

๐Ÿ†• ordered-binary (added, 1.6.0)

๐Ÿ†• remark-footnotes (added, 3.0.0)

๐Ÿ†• remark-gfm (added, 1.0.0)

๐Ÿ†• resolve-alpn (added, 1.2.1)

๐Ÿ†• source-map-js (added, 1.2.1)

๐Ÿ†• weak-lru-cache (added, 1.2.2)

๐Ÿ—‘๏ธ detab (removed)

๐Ÿ—‘๏ธ trim-lines (removed)


Depfu Status

Depfu will automatically keep this PR conflict-free, as long as you don't add any commits to this branch yourself. You can also trigger a rebase manually by commenting with @depfu rebase.

All Depfu comment commands
@โ€‹depfu rebase
Rebases against your default branch and redoes this update
@โ€‹depfu recreate
Recreates this PR, overwriting any edits that you've made to it
@โ€‹depfu merge
Merges this PR once your tests are passing and conflicts are resolved
@โ€‹depfu cancel merge
Cancels automatic merging of this PR
@โ€‹depfu close
Closes this PR and deletes the branch
@โ€‹depfu reopen
Restores the branch and reopens this PR (if it's closed)
@โ€‹depfu pause
Ignores all future updates for this dependency and closes this PR
@โ€‹depfu pause [minor|major]
Ignores all future minor/major updates for this dependency and closes this PR
@โ€‹depfu resume
Future versions of this dependency will create PRs again (leaves this PR as is)

@depfu depfu bot added the depfu label Aug 28, 2025
@codesandbox
Copy link

codesandbox bot commented Aug 28, 2025

Review or Edit in CodeSandbox

Open the branch in Web Editor โ€ข VS Code โ€ข Insiders

Open Preview

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant