Description
All versions of the package wifey are vulnerable to Command Injection via the connect() function due to improper input sanitization.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0589 | wifey vulnerable to Command Injection due to improper input sanitization |
Github GHSA |
GHSA-xj9v-6q2f-vqhx | wifey vulnerable to Command Injection due to improper input sanitization |
References
| Link | Providers |
|---|---|
| https://security.snyk.io/vuln/SNYK-JS-WIFEY-3175615 |
|
History
Wed, 09 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-04-09T14:07:05.913Z
Reserved: 2022-02-24T11:58:23.968Z
Link: CVE-2022-25890
Updated: 2024-08-03T04:49:44.146Z
Status : Modified
Published: 2023-01-09T05:15:10.917
Modified: 2025-04-09T14:15:23.507
Link: CVE-2022-25890
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA