The @urql/next package is vulnerable to XSS. To exploit this an attacker would need to ensure that the response returns html tags and that the web-application is using streamed responses (non-RSC). This vulnerability is due to improper escaping of html-like characters in the response-stream.
To fix this vulnerability upgrade to version 1.1.1
{
"cwe_ids": [
"CWE-79"
],
"github_reviewed": true,
"nvd_published_at": "2024-01-30T18:15:48Z",
"github_reviewed_at": "2024-01-30T20:57:28Z",
"severity": "HIGH"
}