The @urql/next
package is vulnerable to XSS. To exploit this an attacker would need to ensure that the response returns html
tags and that the web-application is using streamed responses (non-RSC). This vulnerability is due to improper escaping of html-like characters in the response-stream.
To fix this vulnerability upgrade to version 1.1.1
{ "nvd_published_at": "2024-01-30T18:15:48Z", "cwe_ids": [ "CWE-79" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-01-30T20:57:28Z" }