Skip to content

UID2-6676: upgrade serialize-javascript to fix GHSA-5c6j-r48x-rmvq RCE#998

Merged
cYKatherine merged 1 commit intomainfrom
kchen-UID2-6676-serialize-js-rce
Mar 2, 2026
Merged

UID2-6676: upgrade serialize-javascript to fix GHSA-5c6j-r48x-rmvq RCE#998
cYKatherine merged 1 commit intomainfrom
kchen-UID2-6676-serialize-js-rce

Conversation

@cYKatherine
Copy link
Contributor

Summary

Fixes GHSA-5c6j-r48x-rmvq — a critical Remote Code Execution (RCE) vulnerability in the `serialize-javascript` npm package.

Severity: Critical (CWE-94: Code Injection)

Root cause: `RegExp.flags` and `Date.prototype.toISOString()` are interpolated into serialized output without sanitization. A crafted `RegExp` or `Date` object can break out of generated string literals, leading to arbitrary code execution when the output is deserialized.

Affected versions: `serialize-javascript <= 7.0.2` — Fixed in 7.0.3

Changes:

  • `overrides.serialize-javascript`: (new) `^7.0.3`

Resolved in lockfile: `serialize-javascript@7.0.3`

Part of UID2-6676. Also affects: uid2-self-serve-portal, uid2-web-integrations.

Test plan

  • CI builds and tests pass
  • `npm audit` shows serialize-javascript vulnerability resolved

🤖 Generated with Claude Code

Adds serialize-javascript override to pin to patched version:
- overrides/serialize-javascript: (new) ^7.0.3

GHSA-5c6j-r48x-rmvq: Critical RCE via unsanitized RegExp.flags and
Date.prototype.toISOString() in serialized output, affects
serialize-javascript <= 7.0.2.

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
@cYKatherine cYKatherine merged commit 6e302e5 into main Mar 2, 2026
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants