Skip to content

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Sep 19, 2025

Bumps brace-expansion from 1.1.11 to 1.1.12.

Release notes

Sourced from brace-expansion's releases.

v1.1.12

  • pkg: publish on tag 1.x c460dbd
  • fmt ccb8ac6
  • Fix potential ReDoS Vulnerability or Inefficient Regular Expression (#65) c3c73c8

juliangruber/brace-expansion@v1.1.11...v1.1.12

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [brace-expansion](https://github.com/juliangruber/brace-expansion) from 1.1.11 to 1.1.12.
- [Release notes](https://github.com/juliangruber/brace-expansion/releases)
- [Commits](juliangruber/brace-expansion@1.1.11...v1.1.12)

---
updated-dependencies:
- dependency-name: brace-expansion
  dependency-version: 1.1.12
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file javascript Pull requests that update javascript code labels Sep 19, 2025
@dependabot dependabot bot requested a review from a team as a code owner September 19, 2025 20:30
@dependabot dependabot bot added dependencies Pull requests that update a dependency file javascript Pull requests that update javascript code labels Sep 19, 2025
Copy link

netlify bot commented Sep 19, 2025

Deploy Preview for docs-optimism failed. Why did it fail? →

Name Link
🔨 Latest commit 65927a5
🔍 Latest deploy log https://app.netlify.com/projects/docs-optimism/deploys/68cdbd6d8c5ffa00076d1bb3

Copy link

Wiz Scan Summary

Scanner Findings
Vulnerability Finding Vulnerabilities 2 Critical 9 High
Data Finding Sensitive Data -
Total 2 Critical 9 High

View scan details in Wiz

To detect these findings earlier in the dev lifecycle, try using Wiz Code VS Code Extension.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High Vulnerability Finding on line 0

More Details

Vulnerabilities [dompurify:3.0.6]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-45801 High GHSA-mmhx-hmjr-r674 3.1.3 7.3 3.9 false false
CVE-2024-47875 High GHSA-gx9m-whjm-85jf 3.1.3 10.0 3.9 false false
CVE-2025-26791 Medium GHSA-vhxf-7vqr-mrjg 3.2.4 4.5 1.4 false false

To ignore this finding as an exception, reply to this conversation with #wiz_ignore reason

If you'd like to ignore this finding in all future scans, add an exception in the .wiz file (learn more) or create an Ignore Rule (learn more).

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High Vulnerability Finding on line 0

More Details

Vulnerabilities [@apidevtools/json-schema-ref-parser:11.1.0]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-29651 High GHSA-5f97-h2c2-826q 11.2.0 8.1 2.2 false false

To ignore this finding as an exception, reply to this conversation with #wiz_ignore reason

If you'd like to ignore this finding in all future scans, add an exception in the .wiz file (learn more) or create an Ignore Rule (learn more).

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High Vulnerability Finding on line 0

More Details

Vulnerabilities [mermaid:10.6.1]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
GHSA-m4gq-x24j-jpmf High GHSA-m4gq-x24j-jpmf 10.9.3 7.0 - false false

To ignore this finding as an exception, reply to this conversation with #wiz_ignore reason

If you'd like to ignore this finding in all future scans, add an exception in the .wiz file (learn more) or create an Ignore Rule (learn more).

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High Vulnerability Finding on line 0

More Details

Vulnerabilities [ws:8.13.0]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-37890 High GHSA-3h5v-q93c-6h6q 8.17.1 7.5 3.9 false false

To ignore this finding as an exception, reply to this conversation with #wiz_ignore reason

If you'd like to ignore this finding in all future scans, add an exception in the .wiz file (learn more) or create an Ignore Rule (learn more).

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High Vulnerability Finding on line 0

More Details

Vulnerabilities [cross-spawn:7.0.3]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-21538 High GHSA-3xgq-45jj-v275 7.0.5 7.7 3.9 false false

To ignore this finding as an exception, reply to this conversation with #wiz_ignore reason

If you'd like to ignore this finding in all future scans, add an exception in the .wiz file (learn more) or create an Ignore Rule (learn more).

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Critical Vulnerability Finding on line 0

More Details

Vulnerabilities [next:14.2.21]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2025-29927 Critical GHSA-f82v-jwr5-mffw 14.2.25 9.1 3.9 true false
CVE-2025-32421 Low GHSA-qpjv-v59x-3qc4 14.2.24 3.7 2.2 false false
CVE-2025-48068 Low GHSA-3h52-269p-cp9r 14.2.30 2.3 2.8 false false
CVE-2025-55173 Medium GHSA-xv57-4mr9-wg8v 14.2.31 4.3 2.8 false false
CVE-2025-57752 Medium GHSA-g5qg-72qw-gw5v 14.2.31 6.2 2.5 false false
CVE-2025-57822 Medium GHSA-4342-x723-ch2f 14.2.32 8.2 3.9 false false

To ignore this finding as an exception, reply to this conversation with #wiz_ignore reason

If you'd like to ignore this finding in all future scans, add an exception in the .wiz file (learn more) or create an Ignore Rule (learn more).

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High Vulnerability Finding on line 0

More Details

Vulnerabilities [cross-spawn:5.1.0]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-21538 High GHSA-3xgq-45jj-v275 6.0.6 7.7 3.9 false false

To ignore this finding as an exception, reply to this conversation with #wiz_ignore reason

If you'd like to ignore this finding in all future scans, add an exception in the .wiz file (learn more) or create an Ignore Rule (learn more).

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Critical Vulnerability Finding on line 0

More Details

Vulnerabilities [elliptic:6.5.4]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-42459 Low GHSA-f7q4-pwc6-w24p 6.5.7 5.3 3.9 false false
CVE-2024-42460 Low GHSA-977x-g7h5-7qgw 6.5.7 5.3 3.9 false false
CVE-2024-42461 Low GHSA-49q7-c7j4-3p7m 6.5.7 9.1 3.9 false false
CVE-2024-48948 Low GHSA-fc9h-whq2-v747 6.6.0 4.8 2.2 false false
CVE-2024-48949 Low GHSA-434g-2637-qmqr 6.5.6 9.1 3.9 false false
GHSA-vjh7-7g9h-fjfh Critical GHSA-vjh7-7g9h-fjfh 6.6.1 9.0 - false false

To ignore this finding as an exception, reply to this conversation with #wiz_ignore reason

If you'd like to ignore this finding in all future scans, add an exception in the .wiz file (learn more) or create an Ignore Rule (learn more).

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High Vulnerability Finding on line 0

More Details

Vulnerabilities [braces:3.0.2]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-4068 High GHSA-grv7-fg5c-xmjg 3.0.3 7.5 3.9 false false

To ignore this finding as an exception, reply to this conversation with #wiz_ignore reason

If you'd like to ignore this finding in all future scans, add an exception in the .wiz file (learn more) or create an Ignore Rule (learn more).

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High Vulnerability Finding on line 0

More Details

Vulnerabilities [ws:7.4.6]

Name Severity Source Fixed version CVSS score CVSS exploitability score Has public exploit Has CISA KEV exploit
CVE-2024-37890 High GHSA-3h5v-q93c-6h6q 7.5.10 7.5 3.9 false false

To ignore this finding as an exception, reply to this conversation with #wiz_ignore reason

If you'd like to ignore this finding in all future scans, add an exception in the .wiz file (learn more) or create an Ignore Rule (learn more).

@krofax krofax closed this Sep 22, 2025
Copy link
Contributor Author

dependabot bot commented on behalf of github Sep 22, 2025

OK, I won't notify you again about this release, but will get in touch when a new version is available. If you'd rather skip all updates until the next major or minor version, let me know by commenting @dependabot ignore this major version or @dependabot ignore this minor version.

If you change your mind, just re-open this PR and I'll resolve any conflicts on it.

@dependabot dependabot bot deleted the dependabot/npm_and_yarn/brace-expansion-1.1.12 branch September 22, 2025 15:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file javascript Pull requests that update javascript code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant