Skip to content

kleros-v2-contracts-2.0.0-rc.2.tgz: 15 vulnerabilities (highest severity is: 8.1) #2256

@mend-bolt-for-github

Description

@mend-bolt-for-github
Vulnerable Library - kleros-v2-contracts-2.0.0-rc.2.tgz

Path to dependency file: /package.json

Path to vulnerable library: /.yarn/cache/micromatch-npm-4.0.5-cfab5d7669-a749888789.zip

Found in HEAD commit: 05e8b49b46fd236d5681f047620959f8667a00e4

Vulnerabilities

Vulnerability Severity CVSS Dependency Type Fixed in (kleros-v2-contracts version) Remediation Possible**
CVE-2026-4800 High 8.1 lodash-4.17.21.tgz Transitive N/A*
CVE-2026-33671 High 7.5 picomatch-2.3.1.tgz Transitive N/A*
CVE-2024-37890 High 7.5 ws-7.4.6.tgz Transitive N/A*
CVE-2024-21538 High 7.5 cross-spawn-6.0.5.tgz Transitive N/A*
CVE-2025-13465 High 7.2 lodash-4.17.21.tgz Transitive N/A*
CVE-2026-2950 Medium 6.5 lodash-4.17.21.tgz Transitive N/A*
CVE-2025-27789 Medium 6.2 runtime-7.26.0.tgz Transitive N/A*
CVE-2026-33672 Medium 5.3 picomatch-2.3.1.tgz Transitive N/A*
CVE-2026-2739 Medium 5.3 bn.js-5.2.1.tgz Transitive N/A*
CVE-2025-64718 Medium 5.3 js-yaml-3.14.1.tgz Transitive N/A*
CVE-2025-53638 Medium 5.3 solady-0.0.182.tgz Transitive N/A*
CVE-2024-4067 Medium 5.3 micromatch-4.0.5.tgz Transitive N/A*
CVE-2022-25883 Medium 5.3 semver-5.7.1.tgz Transitive N/A*
CVE-2026-45736 Medium 4.4 ws-8.18.1.tgz Transitive N/A*
CVE-2026-33532 Medium 4.3 yaml-1.10.2.tgz Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2026-4800

Vulnerable Library - lodash-4.17.21.tgz

Lodash modular utilities.

Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.21.tgz

Path to dependency file: /package.json

Path to vulnerable library: /.yarn/cache/lodash-npm-4.17.21-6382451519-c08619c038.zip

Dependency Hierarchy:

  • kleros-v2-contracts-2.0.0-rc.2.tgz (Root Library)
    • shutter-sdk-0.0.2.tgz
      • lodash-4.17.21.tgz (Vulnerable Library)

Found in HEAD commit: 05e8b49b46fd236d5681f047620959f8667a00e4

Found in base branch: dev

Vulnerability Details

Impact:
The fix for CVE-2021-23337 (GHSA-35jh-r3h4-6jhm) added validation for the variable option in _.template but did not apply the same validation to options.imports key names. Both paths flow into the same Function() constructor sink.
When an application passes untrusted input as options.imports key names, an attacker can inject default-parameter expressions that execute arbitrary code at template compilation time.
Additionally, _.template uses assignInWith to merge imports, which enumerates inherited properties via for..in. If Object.prototype has been polluted by any other vector, the polluted keys are copied into the imports object and passed to Function().
Patches:
Users should upgrade to version 4.18.0.
Workarounds:
Do not pass untrusted input as key names in options.imports. Only use developer-controlled, static key names.

Publish Date: 2026-03-31

URL: CVE-2026-4800

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-r5fr-rjxr-66jc

Release Date: 2026-03-31

Fix Resolution: lodash-amd - 4.18.0,lodash.template - 4.18.0,lodash-es - 4.18.0,lodash - 4.18.0

Step up your Open Source Security Game with Mend here

CVE-2026-33671

Vulnerable Library - picomatch-2.3.1.tgz

Blazing fast and accurate glob matcher written in JavaScript, with no dependencies and full support for standard and extended Bash glob features, including braces, extglobs, POSIX brackets, and regular expressions.

Library home page: https://registry.npmjs.org/picomatch/-/picomatch-2.3.1.tgz

Path to dependency file: /package.json

Path to vulnerable library: /.yarn/cache/picomatch-npm-2.3.1-c782cfd986-60c2595003.zip

Dependency Hierarchy:

  • kleros-v2-contracts-2.0.0-rc.2.tgz (Root Library)
    • contracts-1.4.0.tgz
      • cli-2.28.1.tgz
        • config-3.1.1.tgz
          • micromatch-4.0.8.tgz
            • picomatch-2.3.1.tgz (Vulnerable Library)

Found in HEAD commit: 05e8b49b46fd236d5681f047620959f8667a00e4

Found in base branch: dev

Vulnerability Details

Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) when processing crafted extglob patterns. Certain patterns using extglob quantifiers such as "+()" and "()", especially when combined with overlapping alternatives or nested extglobs, are compiled into regular expressions that can exhibit catastrophic backtracking on non-matching input. Applications are impacted when they allow untrusted users to supply glob patterns that are passed to "picomatch" for compilation or matching. In those cases, an attacker can cause excessive CPU consumption and block the Node.js event loop, resulting in a denial of service. Applications that only use trusted, developer-controlled glob patterns are much less likely to be exposed in a security-relevant way. This issue is fixed in picomatch 4.0.4, 3.0.2 and 2.3.2. Users should upgrade to one of these versions or later, depending on their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to "picomatch". Possible mitigations include disabling extglob support for untrusted patterns by using "noextglob: true", rejecting or sanitizing patterns containing nested extglobs or extglob quantifiers such as "+()" and "()", enforcing strict allowlists for accepted pattern syntax, running matching in an isolated worker or separate process with time and resource limits, and applying application-level request throttling and input validation for any endpoint that accepts glob patterns.

Publish Date: 2026-03-26

URL: CVE-2026-33671

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-03-25

Fix Resolution: https://github.com/micromatch/picomatch.git - 3.0.2,https://github.com/micromatch/picomatch.git - 4.0.4,https://github.com/micromatch/picomatch.git - 2.3.2

Step up your Open Source Security Game with Mend here

CVE-2024-37890

Vulnerable Library - ws-7.4.6.tgz

Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js

Library home page: https://registry.npmjs.org/ws/-/ws-7.4.6.tgz

Path to dependency file: /package.json

Path to vulnerable library: /.yarn/cache/ws-npm-7.4.6-9c9a725604-150e3f917b.zip

Dependency Hierarchy:

  • kleros-v2-contracts-2.0.0-rc.2.tgz (Root Library)
    • contracts-1.4.0.tgz
      • contracts-0.6.0.tgz
        • core-utils-0.12.0.tgz
          • providers-5.7.2.tgz
            • ws-7.4.6.tgz (Vulnerable Library)

Found in HEAD commit: 05e8b49b46fd236d5681f047620959f8667a00e4

Found in base branch: dev

Vulnerability Details

ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876), ws@6.2.3 (eeb76d3), and ws@5.2.4 (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied.

Publish Date: 2024-06-17

URL: CVE-2024-37890

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-3h5v-q93c-6h6q

Release Date: 2024-06-17

Fix Resolution: ws - 5.2.4,6.2.3,7.5.10,8.17.1

Step up your Open Source Security Game with Mend here

CVE-2024-21538

Vulnerable Library - cross-spawn-6.0.5.tgz

Cross platform child_process#spawn and child_process#spawnSync

Library home page: https://registry.npmjs.org/cross-spawn/-/cross-spawn-6.0.5.tgz

Path to dependency file: /package.json

Path to vulnerable library: /.yarn/cache/cross-spawn-npm-6.0.5-2deab6c280-f07e643b48.zip

Dependency Hierarchy:

  • kleros-v2-contracts-2.0.0-rc.2.tgz (Root Library)
    • contracts-1.4.0.tgz
      • nitro-contracts-3.0.0.tgz
        • patch-package-6.5.1.tgz
          • cross-spawn-6.0.5.tgz (Vulnerable Library)

Found in HEAD commit: 05e8b49b46fd236d5681f047620959f8667a00e4

Found in base branch: dev

Vulnerability Details

Versions of the package cross-spawn before 6.0.6, from 7.0.0 and before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string.

Publish Date: 2024-11-08

URL: CVE-2024-21538

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2024-21538

Release Date: 2024-11-08

Fix Resolution: org.webjars.npm:cross-spawn:6.0.6,https://github.com/moxystudio/node-cross-spawn.git - v6.0.6,https://github.com/moxystudio/node-cross-spawn.git - v7.0.5,cross-spawn - 7.0.5,cross-spawn - 6.0.6

Step up your Open Source Security Game with Mend here

CVE-2025-13465

Vulnerable Library - lodash-4.17.21.tgz

Lodash modular utilities.

Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.21.tgz

Path to dependency file: /package.json

Path to vulnerable library: /.yarn/cache/lodash-npm-4.17.21-6382451519-c08619c038.zip

Dependency Hierarchy:

  • kleros-v2-contracts-2.0.0-rc.2.tgz (Root Library)
    • shutter-sdk-0.0.2.tgz
      • lodash-4.17.21.tgz (Vulnerable Library)

Found in HEAD commit: 05e8b49b46fd236d5681f047620959f8667a00e4

Found in base branch: dev

Vulnerability Details

Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset and _.omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.
The issue permits deletion of properties but does not allow overwriting their original behavior.
This issue is patched on 4.17.23

Publish Date: 2026-01-21

URL: CVE-2025-13465

CVSS 3 Score Details (7.2)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-xxjr-mmjv-4gpg

Release Date: 2026-01-21

Fix Resolution: lodash-amd - 4.17.23,lodash - 4.17.23,lodash-es - 4.17.23

Step up your Open Source Security Game with Mend here

CVE-2026-2950

Vulnerable Library - lodash-4.17.21.tgz

Lodash modular utilities.

Library home page: https://registry.npmjs.org/lodash/-/lodash-4.17.21.tgz

Path to dependency file: /package.json

Path to vulnerable library: /.yarn/cache/lodash-npm-4.17.21-6382451519-c08619c038.zip

Dependency Hierarchy:

  • kleros-v2-contracts-2.0.0-rc.2.tgz (Root Library)
    • shutter-sdk-0.0.2.tgz
      • lodash-4.17.21.tgz (Vulnerable Library)

Found in HEAD commit: 05e8b49b46fd236d5681f047620959f8667a00e4

Found in base branch: dev

Vulnerability Details

Impact:
Lodash versions 4.17.23 and earlier are vulnerable to prototype pollution in the _.unset and _.omit functions. The fix for (CVE-2025-13465: GHSA-xxjr-mmjv-4gpg) only guards against string key members, so an attacker can bypass the check by passing array-wrapped path segments. This allows deletion of properties from built-in prototypes such as Object.prototype, Number.prototype, and String.prototype.
The issue permits deletion of prototype properties but does not allow overwriting their original behavior.
Patches:
This issue is patched in 4.18.0.
Workarounds:
None. Upgrade to the patched version.

Publish Date: 2026-03-31

URL: CVE-2026-2950

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-xxjr-mmjv-4gpg

Release Date: 2026-03-31

Fix Resolution: lodash-es - 4.17.23,lodash-amd - 4.17.23,lodash - 4.17.23

Step up your Open Source Security Game with Mend here

CVE-2025-27789

Vulnerable Library - runtime-7.26.0.tgz

babel's modular runtime helpers

Library home page: https://registry.npmjs.org/@⁠babel/runtime/-/runtime-7.26.0.tgz

Path to dependency file: /package.json

Path to vulnerable library: /.yarn/cache/@⁠babel-runtime-npm-7.26.0-9afa3c4ef6-9f4ea1c1d5.zip

Dependency Hierarchy:

  • kleros-v2-contracts-2.0.0-rc.2.tgz (Root Library)
    • contracts-1.4.0.tgz
      • cli-2.28.1.tgz
        • get-packages-1.1.3.tgz
          • runtime-7.26.0.tgz (Vulnerable Library)

Found in HEAD commit: 05e8b49b46fd236d5681f047620959f8667a00e4

Found in base branch: dev

Vulnerability Details

Babel is a compiler for writing next generation JavaScript. When using versions of Babel prior to 7.26.10 and 8.0.0-alpha.17 to compile regular expression named capturing groups, Babel will generate a polyfill for the ".replace" method that has quadratic complexity on some specific replacement pattern strings (i.e. the second argument passed to ".replace"). Generated code is vulnerable if all the following conditions are true: Using Babel to compile regular expression named capturing groups, using the ".replace" method on a regular expression that contains named capturing groups, and the code using untrusted strings as the second argument of ".replace". This problem has been fixed in "@⁠babel/helpers" and "@⁠babel/runtime" 7.26.10 and 8.0.0-alpha.17. It's likely that individual users do not directly depend on "@⁠babel/helpers", and instead depend on "@⁠babel/core" (which itself depends on "@⁠babel/helpers"). Upgrading to "@⁠babel/core" 7.26.10 is not required, but it guarantees use of a new enough "@⁠babel/helpers" version. Note that just updating Babel dependencies is not enough; one will also need to re-compile the code. No known workarounds are available.

Publish Date: 2025-03-11

URL: CVE-2025-27789

CVSS 3 Score Details (6.2)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-968p-4wvh-cqc8

Release Date: 2025-03-11

Fix Resolution: @⁠babel/runtime - 8.0.0-alpha.17,@⁠babel/helpers - 8.0.0-alpha.17,@⁠babel/runtime-corejs3 - 8.0.0-alpha.17,https://github.com/babel/babel.git - v7.26.10,@⁠babel/runtime-corejs2 - 8.0.0-alpha.17,@⁠babel/runtime - 7.26.10,@⁠babel/helpers - 7.26.10

Step up your Open Source Security Game with Mend here

CVE-2026-33672

Vulnerable Library - picomatch-2.3.1.tgz

Blazing fast and accurate glob matcher written in JavaScript, with no dependencies and full support for standard and extended Bash glob features, including braces, extglobs, POSIX brackets, and regular expressions.

Library home page: https://registry.npmjs.org/picomatch/-/picomatch-2.3.1.tgz

Path to dependency file: /package.json

Path to vulnerable library: /.yarn/cache/picomatch-npm-2.3.1-c782cfd986-60c2595003.zip

Dependency Hierarchy:

  • kleros-v2-contracts-2.0.0-rc.2.tgz (Root Library)
    • contracts-1.4.0.tgz
      • cli-2.28.1.tgz
        • config-3.1.1.tgz
          • micromatch-4.0.8.tgz
            • picomatch-2.3.1.tgz (Vulnerable Library)

Found in HEAD commit: 05e8b49b46fd236d5681f047620959f8667a00e4

Found in base branch: dev

Vulnerability Details

Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to a method injection vulnerability affecting the "POSIX_REGEX_SOURCE" object. Because the object inherits from "Object.prototype", specially crafted POSIX bracket expressions (e.g., "[[:constructor:]]") can reference inherited method names. These methods are implicitly converted to strings and injected into the generated regular expression. This leads to incorrect glob matching behavior (integrity impact), where patterns may match unintended filenames. The issue does not enable remote code execution, but it can cause security-relevant logic errors in applications that rely on glob matching for filtering, validation, or access control. All users of affected "picomatch" versions that process untrusted or user-controlled glob patterns are potentially impacted. This issue is fixed in picomatch 4.0.4, 3.0.2 and 2.3.2. Users should upgrade to one of these versions or later, depending on their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to picomatch. Possible mitigations include sanitizing or rejecting untrusted glob patterns, especially those containing POSIX character classes like "[[:...:]]"; avoiding the use of POSIX bracket expressions if user input is involved; and manually patching the library by modifying "POSIX_REGEX_SOURCE" to use a null prototype.

Publish Date: 2026-03-26

URL: CVE-2026-33672

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-03-25

Fix Resolution: https://github.com/micromatch/picomatch.git - 2.3.2,https://github.com/micromatch/picomatch.git - 3.0.2,https://github.com/micromatch/picomatch.git - 4.0.4

Step up your Open Source Security Game with Mend here

CVE-2026-2739

Vulnerable Library - bn.js-5.2.1.tgz

Big number implementation in pure javascript

Library home page: https://registry.npmjs.org/bn.js/-/bn.js-5.2.1.tgz

Path to dependency file: /package.json

Path to vulnerable library: /.yarn/cache/bn.js-npm-5.2.1-dc952b1965-7a7e8764d7.zip

Dependency Hierarchy:

  • kleros-v2-contracts-2.0.0-rc.2.tgz (Root Library)
    • contracts-1.4.0.tgz
      • contracts-0.6.0.tgz
        • core-utils-0.12.0.tgz
          • transactions-5.7.0.tgz
            • signing-key-5.7.0.tgz
              • bn.js-5.2.1.tgz (Vulnerable Library)

Found in HEAD commit: 05e8b49b46fd236d5681f047620959f8667a00e4

Found in base branch: dev

Vulnerability Details

This affects versions of the package bn.js before 5.2.3. Calling maskn(0) on any BN instance corrupts the internal state, causing toString(), divmod(), and other methods to enter an infinite loop, hanging the process indefinitely.

Publish Date: 2026-02-20

URL: CVE-2026-2739

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-02-20

Fix Resolution: https://github.com/indutny/bn.js.git - v5.2.3

Step up your Open Source Security Game with Mend here

CVE-2025-64718

Vulnerable Library - js-yaml-3.14.1.tgz

YAML 1.2 parser and serializer

Library home page: https://registry.npmjs.org/js-yaml/-/js-yaml-3.14.1.tgz

Path to dependency file: /package.json

Path to vulnerable library: /.yarn/cache/js-yaml-npm-3.14.1-b968c6095e-9e22d80b4d.zip

Dependency Hierarchy:

  • kleros-v2-contracts-2.0.0-rc.2.tgz (Root Library)
    • contracts-1.4.0.tgz
      • cli-2.28.1.tgz
        • read-0.6.5.tgz
          • parse-0.4.1.tgz
            • js-yaml-3.14.1.tgz (Vulnerable Library)

Found in HEAD commit: 05e8b49b46fd236d5681f047620959f8667a00e4

Found in base branch: dev

Vulnerability Details

js-yaml is a JavaScript YAML parser and dumper. In js-yaml before 4.1.1 and 3.14.2, it's possible for an attacker to modify the prototype of the result of a parsed yaml document via prototype pollution ("proto"). All users who parse untrusted yaml documents may be impacted. The problem is patched in js-yaml 4.1.1 and 3.14.2. Users can protect against this kind of attack on the server by using "node --disable-proto=delete" or "deno" (in Deno, pollution protection is on by default).

Publish Date: 2025-11-13

URL: CVE-2025-64718

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-mh29-5h37-fv8m

Release Date: 2025-11-13

Fix Resolution: js-yaml - 4.1.1,js-yaml - 3.14.2

Step up your Open Source Security Game with Mend here

CVE-2025-53638

Vulnerable Library - solady-0.0.182.tgz

Library home page: https://registry.npmjs.org/solady/-/solady-0.0.182.tgz

Path to dependency file: /package.json

Path to vulnerable library: /.yarn/cache/solady-npm-0.0.182-1b328777af-3bc02c37da.zip

Dependency Hierarchy:

  • kleros-v2-contracts-2.0.0-rc.2.tgz (Root Library)
    • contracts-1.4.0.tgz
      • nitro-contracts-3.0.0.tgz
        • solady-0.0.182.tgz (Vulnerable Library)

Found in HEAD commit: 05e8b49b46fd236d5681f047620959f8667a00e4

Found in base branch: dev

Vulnerability Details

Solady is software that provides Solidity snippets with APIs. Starting in version 0.0.125 and prior to version 0.1.24, when an account is deployed via a proxy, using regular Solidity to call its initialization function may result in a silent failure, if the initialization function does not return a "bool" or some other return data. This is because regular Solidity uses "extcodesize(proxy)" to decide if call succeeds. This is insufficient in the case when the proxy points to an empty implementation. Users should upgrade to Solady v0.1.24 or later to receive a patch. Deploy any affected implementations and their factories on new EVM chains as soon as possible.

Publish Date: 2025-07-17

URL: CVE-2025-53638

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Step up your Open Source Security Game with Mend here

CVE-2024-4067

Vulnerable Library - micromatch-4.0.5.tgz

Glob matching for javascript/node.js. A replacement and faster alternative to minimatch and multimatch.

Library home page: https://registry.npmjs.org/micromatch/-/micromatch-4.0.5.tgz

Path to dependency file: /package.json

Path to vulnerable library: /.yarn/cache/micromatch-npm-4.0.5-cfab5d7669-a749888789.zip

Dependency Hierarchy:

  • kleros-v2-contracts-2.0.0-rc.2.tgz (Root Library)
    • contracts-1.4.0.tgz
      • nitro-contracts-3.0.0.tgz
        • patch-package-6.5.1.tgz
          • find-yarn-workspace-root-2.0.0.tgz
            • micromatch-4.0.5.tgz (Vulnerable Library)

Found in HEAD commit: 05e8b49b46fd236d5681f047620959f8667a00e4

Found in base branch: dev

Vulnerability Details

The NPM package "micromatch" prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in "micromatch.braces()" in "index.js" because the pattern ".*" will greedily match anything. By passing a malicious payload, the pattern matching will keep backtracking to the input while it doesn't find the closing bracket. As the input size increases, the consumption time will also increase until it causes the application to hang or slow down. There was a merged fix but further testing shows the issue persists. This issue should be mitigated by using a safe pattern that won't start backtracking the regular expression due to greedy matching. This issue was fixed in version 4.0.8.

Publish Date: 2024-05-13

URL: CVE-2024-4067

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2024-05-13

Fix Resolution: micromatch - 4.0.8

Step up your Open Source Security Game with Mend here

CVE-2022-25883

Vulnerable Library - semver-5.7.1.tgz

The semantic version parser used by npm.

Library home page: https://registry.npmjs.org/semver/-/semver-5.7.1.tgz

Path to dependency file: /package.json

Path to vulnerable library: /.yarn/cache/semver-npm-5.7.1-40bcea106b-fbc71cf007.zip

Dependency Hierarchy:

  • kleros-v2-contracts-2.0.0-rc.2.tgz (Root Library)
    • contracts-1.4.0.tgz
      • nitro-contracts-3.0.0.tgz
        • patch-package-6.5.1.tgz
          • cross-spawn-6.0.5.tgz
            • semver-5.7.1.tgz (Vulnerable Library)

Found in HEAD commit: 05e8b49b46fd236d5681f047620959f8667a00e4

Found in base branch: dev

Vulnerability Details

Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.
Mend Note: The description of this vulnerability differs from MITRE.

Publish Date: 2023-06-21

URL: CVE-2022-25883

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-c2qf-rxjj-qqgw

Release Date: 2023-06-21

Fix Resolution: semver - 5.7.2,6.3.1,7.5.2;org.webjars.npm:semver:7.5.2

Step up your Open Source Security Game with Mend here

CVE-2026-45736

Vulnerable Library - ws-8.18.1.tgz

Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js

Library home page: https://registry.npmjs.org/ws/-/ws-8.18.1.tgz

Path to dependency file: /package.json

Path to vulnerable library: /.yarn/cache/ws-npm-8.18.1-369b0f5491-3f38e9594f.zip

Dependency Hierarchy:

  • kleros-v2-contracts-2.0.0-rc.2.tgz (Root Library)
    • shutter-sdk-0.0.2.tgz
      • viem-2.29.2.tgz
        • ws-8.18.1.tgz (Vulnerable Library)

Found in HEAD commit: 05e8b49b46fd236d5681f047620959f8667a00e4

Found in base branch: dev

Vulnerability Details

ws is an open source WebSocket client and server for Node.js. Prior to 8.20.1, the websocket.close() implementation is vulnerable to uninitialized memory disclosure when a TypedArray is passed as the reason argument. This vulnerability is fixed in 8.20.1.

Publish Date: 2026-05-15

URL: CVE-2026-45736

CVSS 3 Score Details (4.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: High
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-58qx-3vcg-4xpx

Release Date: 2026-05-15

Fix Resolution: ws - 8.20.1,https://github.com/websockets/ws.git - 8.20.1

Step up your Open Source Security Game with Mend here

CVE-2026-33532

Vulnerable Library - yaml-1.10.2.tgz

JavaScript parser and stringifier for YAML

Library home page: https://registry.npmjs.org/yaml/-/yaml-1.10.2.tgz

Path to dependency file: /package.json

Path to vulnerable library: /.yarn/cache/yaml-npm-1.10.2-0e780aebdf-e088b37b4d.zip

Dependency Hierarchy:

  • kleros-v2-contracts-2.0.0-rc.2.tgz (Root Library)
    • contracts-1.4.0.tgz
      • nitro-contracts-3.0.0.tgz
        • patch-package-6.5.1.tgz
          • yaml-1.10.2.tgz (Vulnerable Library)

Found in HEAD commit: 05e8b49b46fd236d5681f047620959f8667a00e4

Found in base branch: dev

Vulnerability Details

"yaml" is a YAML parser and serialiser for JavaScript. Parsing a YAML document with a version of "yaml" on the 1.x branch prior to 1.10.3 or on the 2.x branch prior to 2.8.3 may throw a RangeError due to a stack overflow. The node resolution/composition phase uses recursive function calls without a depth bound. An attacker who can supply YAML for parsing can trigger a "RangeError: Maximum call stack size exceeded" with a small payload (~2–10 KB). The "RangeError" is not a "YAMLParseError", so applications that only catch YAML-specific errors will encounter an unexpected exception type. Depending on the host application's exception handling, this can fail requests or terminate the Node.js process. Flow sequences allow deep nesting with minimal bytes (2 bytes per level: one "[" and one "]"). On the default Node.js stack, approximately 1,000–5,000 levels of nesting (2–10 KB input) exhaust the call stack. The exact threshold is environment-dependent (Node.js version, stack size, call stack depth at invocation). Note: the library's "Parser" (CST phase) uses a stack-based iterative approach and is not affected. Only the compose/resolve phase uses actual call-stack recursion. All three public parsing APIs are affected: "YAML.parse()", "YAML.parseDocument()", and "YAML.parseAllDocuments()". Versions 1.10.3 and 2.8.3 contain a patch.

Publish Date: 2026-03-26

URL: CVE-2026-33532

CVSS 3 Score Details (4.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2026-03-25

Fix Resolution: https://github.com/eemeli/yaml.git - v1.10.3,https://github.com/eemeli/yaml.git - v2.8.3

Step up your Open Source Security Game with Mend here

Metadata

Metadata

Assignees

Labels

Type

No type
No fields configured for issues without a type.

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions