You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Security Enhancement Opportunity: @nx/module-federation webpack version
Dear Nx team,
First, thank you for maintaining this fantastic module federation package that powers many of our enterprise applications! 🚀
Observation
While working with @nx/module-federation (20.3.3), I noticed an opportunity for a security enhancement regarding the webpack dependency (currently at 5.88.0).
Nature: DOM Clobbering Gadget in AutoPublicPathRuntimeModule (potential XSS)
Suggested update: webpack 5.89.0+
Verification Steps Taken
I've validated this enhancement by testing with a local package copy:
Updated webpack to ^5.89.0
Ran full test suite
Confirmed vulnerability resolution via npm audit
No breaking changes observed
Would you consider this update for a future release? Happy to provide any additional information or testing support if helpful!
Thank you for considering this enhancement. Keep up the great work! ⭐️
Labels
security, package: module-federation
Expected Behavior
Current Behavior
@nx/module-federation (20.3.3) ships with webpack 5.88.0, which contains a known security vulnerability (GHSA-4vvj-4cpr-p986). This creates a potential XSS risk via webpack's AutoPublicPathRuntimeModule.
Expected Behavior
The package should use webpack 5.89.0+ to eliminate this security vulnerability, providing the same functionality but with enhanced security. Like upgrading your home security system while keeping all your favorite features! 🏰
Oh, thank you. Yes, you're right, v5.94.0 would be completely fine too, although I haven't tested it yet. I suggested v5.89.0 because it's the next version after the security vulnerability fix that has the least changes.
Current Behavior
Security Enhancement Opportunity: @nx/module-federation webpack version
Dear Nx team,
First, thank you for maintaining this fantastic module federation package that powers many of our enterprise applications! 🚀
Observation
While working with @nx/module-federation (20.3.3), I noticed an opportunity for a security enhancement regarding the webpack dependency (currently at 5.88.0).
Details
Verification Steps Taken
I've validated this enhancement by testing with a local package copy:
Would you consider this update for a future release? Happy to provide any additional information or testing support if helpful!
Thank you for considering this enhancement. Keep up the great work! ⭐️
Labels
security, package: module-federation
Expected Behavior
Current Behavior
@nx/module-federation (20.3.3) ships with webpack 5.88.0, which contains a known security vulnerability (GHSA-4vvj-4cpr-p986). This creates a potential XSS risk via webpack's AutoPublicPathRuntimeModule.
Expected Behavior
The package should use webpack 5.89.0+ to eliminate this security vulnerability, providing the same functionality but with enhanced security. Like upgrading your home security system while keeping all your favorite features! 🏰
GitHub Repo
No response
Steps to Reproduce
Steps to Reproduce
npm audit
Nx Report
Failure Logs
Package Manager Version
npm --version 10.9.2
Operating System
Additional Information
Additional Context
I've validated the fix locally by updating webpack to ^5.89.0 - all tests pass, and the vulnerability is gone.
The text was updated successfully, but these errors were encountered: