zsa is a library for building typesafe server actions in Next.js. All users are impacted. The zsa application transfers the parse error stack from the server to the client in production build mode. This can potentially reveal sensitive information about the server environment, such as the machine username and directory paths. An attacker could exploit this vulnerability to gain unauthorized access to sensitive server information. This information could be used to plan further attacks or gain a deeper understanding of the server infrastructure. This has been patched on `0.3.3`.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2194 | zsa is a library for building typesafe server actions in Next.js. All users are impacted. The zsa application transfers the parse error stack from the server to the client in production build mode. This can potentially reveal sensitive information about the server environment, such as the machine username and directory paths. An attacker could exploit this vulnerability to gain unauthorized access to sensitive server information. This information could be used to plan further attacks or gain a deeper understanding of the server infrastructure. This has been patched on `0.3.3`. |
Github GHSA |
GHSA-wjmj-h3xc-hxp8 | Generation of Error Message Containing Sensitive Information in zsa |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 31 Oct 2024 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Idopesok
Idopesok zsa |
|
| CPEs | cpe:2.3:a:idopesok:zsa:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Idopesok
Idopesok zsa |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T03:50:55.218Z
Reserved: 2024-06-03T17:29:38.329Z
Link: CVE-2024-37162
Updated: 2024-08-02T03:50:55.218Z
Status : Modified
Published: 2024-06-07T15:15:50.617
Modified: 2024-11-21T09:23:20.180
Link: CVE-2024-37162
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA