CVE-2024-11831

A flaw was found in npm-serialize-javascript. The vulnerability occurs because the serialize-javascript module does not properly sanitize certain inputs, such as regex or other JavaScript object types, allowing an attacker to inject malicious code. This code could be executed when deserialized by a web browser, causing Cross-site scripting (XSS) attacks. This issue is critical in environments where serialized data is sent to web clients, potentially compromising the security of the website or web application using this package.
Configurations

No configuration.

History

24 Apr 2025, 13:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHBA-2025:0304 -

13 Feb 2025, 19:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:1468 -

11 Feb 2025, 22:15

Type Values Removed Values Added
Summary
  • (es) Se encontró una falla en npm-serialize-javascript. La vulnerabilidad ocurre porque el módulo serialize-javascript no depura correctamente ciertas entradas, como expresiones regulares u otros tipos de objetos JavaScript, lo que permite que un atacante inyecte código malicioso. Este código podría ejecutarse cuando un navegador web lo deserialice, lo que causa ataques de cross site scripting (XSS). Este problema es crítico en entornos donde se envían datos serializados a clientes web, lo que potencialmente compromete la seguridad del sitio web o la aplicación web que utiliza este paquete.
References
  • () https://access.redhat.com/errata/RHSA-2025:1334 -

10 Feb 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-10 16:15

Updated : 2025-04-24 13:15


NVD link : CVE-2024-11831

Mitre link : CVE-2024-11831

CVE.ORG link : CVE-2024-11831


JSON object : View

Products Affected

No product.

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')