fix: patch ReDoS vulnerabilities in brace-expansion and @eslint/plugin-kit #16
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.



🔒 Security Fixes
Resolves two Dependabot security alerts:
📋 Summary
Patches two Regular Expression Denial of Service (ReDoS) vulnerabilities using pnpm overrides:
1. brace-expansion (CVE-2025-5889)
brace-expansion@1.1.11→1.1.12brace-expansion@2.0.1→2.0.22. @eslint/plugin-kit (GHSA-xffm-g5w8-qvg7)
@eslint/plugin-kit@0.2.8→0.4.0🎯 Why pnpm Overrides?
This is the best solution for both vulnerabilities because:
Why Each Override is Needed
brace-expansion:
test-exclude@7.0.1(via@vitest/coverage-v8)test-excludehasn't updated to use newerminimatch/globversionsminimatch@10.x+uses secure@isaacs/brace-expansion, but upstream hasn't migrated yet@eslint/plugin-kit:
eslint@9.26.0📊 Vulnerability Details
CVE-2025-5889 (brace-expansion)
Severity: LOW (CVSS 3.1: 3.1)
Type: ReDoS via inefficient regex in
expandfunctionImpact: Potential CPU exhaustion with crafted glob patterns
GHSA-xffm-g5w8-qvg7 (@eslint/plugin-kit)
Severity: LOW (CVSS 4.0: 2.3)
Type: ReDoS in
ConfigCommentParser#parseJSONLikeConfigImpact: Blocking execution and high CPU usage with crafted input
Both vulnerabilities have low severity and high attack complexity, affecting only dev dependencies.
📝 What Changed
{ "pnpm": { "overrides": { "brace-expansion@1.1.11": "1.1.12", "brace-expansion@2.0.1": "2.0.2", "@eslint/plugin-kit@0.2.8": "0.4.0" }, "comments": { "overrides": { "brace-expansion": "Security fix for CVE-2025-5889...", "@eslint/plugin-kit": "Security fix for GHSA-xffm-g5w8-qvg7..." } } } }Files Modified:
package.json: Added overrides with explanatory commentspnpm-lock.yaml: Updated vulnerable packages to patched versions✅ Testing
📈 Dependency Chains
brace-expansion
@eslint/plugin-kit