-
Notifications
You must be signed in to change notification settings - Fork 7
Description
Vulnerable Library - graphiql-3.9.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /home/wss-scanner/.yarn/berry/cache/codemirror-npm-5.65.19-5827abbe59-10c0.zip
Found in HEAD commit: da0c9c84fdbc82b3b8e2221482a86225136e26be
Vulnerabilities
| Vulnerability | Severity | Dependency | Type | Fixed in (graphiql version) | Remediation Possible** | |
|---|---|---|---|---|---|---|
| CVE-2025-6493 | 5.3 | codemirror-5.65.19.tgz | Transitive | N/A* | ❌ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2025-6493
Vulnerable Library - codemirror-5.65.19.tgz
Full-featured in-browser code editor
Library home page: https://registry.npmjs.org/codemirror/-/codemirror-5.65.19.tgz
Path to dependency file: /package.json
Path to vulnerable library: /home/wss-scanner/.yarn/berry/cache/codemirror-npm-5.65.19-5827abbe59-10c0.zip
Dependency Hierarchy:
- graphiql-3.9.0.tgz (Root Library)
- react-0.29.0.tgz
- ❌ codemirror-5.65.19.tgz (Vulnerable Library)
- react-0.29.0.tgz
Found in HEAD commit: da0c9c84fdbc82b3b8e2221482a86225136e26be
Found in base branch: main
Vulnerability Details
A vulnerability was found in CodeMirror up to 5.17.0 and classified as problematic. Affected by this issue is some unknown functionality of the file mode/markdown/markdown.js of the component Markdown Mode. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Not all code samples mentioned in the GitHub issue can be found. The repository mentions, that "CodeMirror 6 exists, and is [...] much more actively maintained."
- While the issue was reported up to version 5.17.0, the problematic patterns persisted in versions after that. In version 6.x, the issue has been resolved.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: 2025-06-22
URL: CVE-2025-6493
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
Step up your Open Source Security Game with Mend here
Metadata
Metadata
Assignees
Labels
Type
Projects
Status