Skip to content

chore(deps): update dependency @nestjs/core to v11.1.18 [security]#1228

Merged
underfisk merged 2 commits into
masterfrom
renovate/npm-nestjs-core-vulnerability
May 20, 2026
Merged

chore(deps): update dependency @nestjs/core to v11.1.18 [security]#1228
underfisk merged 2 commits into
masterfrom
renovate/npm-nestjs-core-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented May 20, 2026

This PR contains the following updates:

Package Change Age Confidence
@nestjs/core (source) 11.1.1711.1.18 age confidence

@​nestjs/core Improperly Neutralizes Special Elements in Output Used by a Downstream Component ('Injection')

CVE-2026-35515 / GHSA-36xv-jgw5-4q75

More information

Details

Impact

What kind of vulnerability is it? Who is impacted?

SseStream._transform() interpolates message.type and message.id directly into Server-Sent Events text protocol output without sanitizing newline characters (\r, \n). Since the SSE protocol treats both \r and \n as field delimiters and \n\n as event boundaries, an attacker who can influence these fields through upstream data sources can inject arbitrary SSE events, spoof event types, and corrupt reconnection state. Spring Framework's own security patch (6e97587) validates these same fields (id, event) for the same reason.

Actual impact:

  • Event spoofing: Attacker forges SSE events with arbitrary event: types, causing client-side EventSource.addEventListener() callbacks to fire for wrong event types.
  • Data injection: Attacker injects arbitrary data: payloads, potentially triggering XSS if the client renders SSE data as HTML without sanitization.
  • Reconnection corruption: Attacker injects id: fields, corrupting the Last-Event-ID header on reconnection, causing the client to miss or replay events.
  • Attack precondition: Requires the developer to map user-influenced data to the type or id fields of SSE messages. Direct HTTP request input does not reach these fields without developer code bridging the gap.
Patches

Has the problem been patched? What versions should users upgrade to?

Patched in @nestjs/core@11.1.18

Severity

  • CVSS Score: 6.3 / 10 (Medium)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:L/SA:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Release Notes

nestjs/nest (@​nestjs/core)

v11.1.18

Compare Source

v11.1.18 (2026-04-03)

Bug fixes
Dependencies
Committers: 6

Configuration

📅 Schedule: (in timezone America/New_York)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot force-pushed the renovate/npm-nestjs-core-vulnerability branch from 8d49379 to bae4a7c Compare May 20, 2026 12:56
@underfisk
Copy link
Copy Markdown
Collaborator

@copilot @copilot rebase and re-run "pnpm install" to generate the lock, also verify that the update is not only on the lock file but also the version is reflected on the package.json

Since this is a nestjs update, let's update all nestjs packages to the latest version available instead

@renovate renovate Bot force-pushed the renovate/npm-nestjs-core-vulnerability branch from bae4a7c to 2e57814 Compare May 20, 2026 13:12
Copy link
Copy Markdown
Contributor

Copilot AI commented May 20, 2026

@copilot @copilot rebase and re-run "pnpm install" to generate the lock, also verify that the update is not only on the lock file but also the version is reflected on the package.json

Since this is...

Implemented in e97ad52. I rebased the branch, reran pnpm install --no-frozen-lockfile to regenerate pnpm-lock.yaml, and updated all @nestjs/* versions in package.json files to the latest available (@nestjs/common/core/platform-express/testing -> ^11.1.21, @nestjs/cli -> ^11.0.21). No UI changes were made, so there is no screenshot to provide.

@renovate
Copy link
Copy Markdown
Contributor Author

renovate Bot commented May 20, 2026

Edited/Blocked Notification

Renovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR.

You can manually request rebase by checking the rebase/retry box above.

⚠️ Warning: custom changes will be lost.

Copilot AI requested a review from underfisk May 20, 2026 13:21
@underfisk underfisk merged commit d0b4dab into master May 20, 2026
2 checks passed
@underfisk underfisk deleted the renovate/npm-nestjs-core-vulnerability branch May 20, 2026 13:47
underfisk added a commit that referenced this pull request May 20, 2026
* chore(deps): update dependency vite to v8.0.5 [security]

* chore(deps): rebase vite update and regenerate lockfile

Agent-Logs-Url: https://github.com/golevelup/nestjs/sessions/84f0c4b4-34e1-44cd-a4a0-39ab6a622ca3

* chore(deps): update dependency @nestjs/core to v11.1.18 [security] (#1228)

* chore(deps): update dependency @nestjs/core to v11.1.18 [security]

* chore(deps): update all nestjs dependencies to latest versions

Agent-Logs-Url: https://github.com/golevelup/nestjs/sessions/6d0c2ec5-bf89-417f-85bd-bf8c3976575b

---------

Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Co-authored-by: copilot-swe-agent[bot] <198982749+Copilot@users.noreply.github.com>

* chore(deps): update vitest monorepo to v4.1.7 (#1212)

* chore(deps): update vitest monorepo to v4.1.7

* chore(deps): update vitest monorepo to v4.1.7 in package.json and regenerate lock file

Agent-Logs-Url: https://github.com/golevelup/nestjs/sessions/52c518f8-6b31-40c1-8910-6f4071ee5044

---------

Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Co-authored-by: Rodrigo <monstawoodwow@gmail.com>
Co-authored-by: copilot-swe-agent[bot] <198982749+Copilot@users.noreply.github.com>

* chore(deps): update dependency @aws-sdk/client-s3 to v3.1050.0 (#1213)

* chore(deps): update dependency @aws-sdk/client-s3 to v3.1050.0

* chore(deps): update @aws-sdk/client-s3 to v3.1050.0 in package.json and regenerate lock

Agent-Logs-Url: https://github.com/golevelup/nestjs/sessions/73566885-97bd-42ee-9628-c04be5f72cbb

---------

Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Co-authored-by: Rodrigo <monstawoodwow@gmail.com>
Co-authored-by: copilot-swe-agent[bot] <198982749+Copilot@users.noreply.github.com>

* chore(deps): update dependency vite to v8.0.5 [security]

* chore(deps): rebase vite update and regenerate lockfile

Agent-Logs-Url: https://github.com/golevelup/nestjs/sessions/84f0c4b4-34e1-44cd-a4a0-39ab6a622ca3

* chore(deps): rebase branch and regenerate pnpm lockfile

Agent-Logs-Url: https://github.com/golevelup/nestjs/sessions/2b402de7-41db-4881-a012-cc9eee6acccb

---------

Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Co-authored-by: Rodrigo <monstawoodwow@gmail.com>
Co-authored-by: copilot-swe-agent[bot] <198982749+Copilot@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants