-
Notifications
You must be signed in to change notification settings - Fork 3.9k
Open
Labels
Bugthing that needs fixingthing that needs fixingNeeds Triageneeds review for next stepsneeds review for next steps
Description
Is there an existing issue for this?
- I have searched the existing issues
This issue exists in the latest npm version
- I am using the latest npm
Current Behavior
Running npm audit or a trivy scanner flags a high CVE-2025-64756 vulnerability due to [email protected]. [email protected] fixes the issue. The problem is that this breaks application builds that make use of tools such as trivy scanner.
Notice that the CVE itself doesn't affect npm, as the issue is only in the cli interface of glob, while npm uses its library interface.
Expected Behavior
npm should not bundle a vulnerable version of glob and therefore not break builds due to security scans
Steps To Reproduce
- In this environment:
Node.js version: 20.17.0 (or higher)
npm version: 11.6.2
- Run 'npm audit'
- See error:
glob 10.3.7 - 11.0.3
Severity: high
glob CLI: Command injection via -c/--cmd executes matches with shell:true - https://github.com/advisories/GHSA-5j98-mcp5-4vw2
fix available via `npm audit fix`
node_modules/glob
Environment
- npm: 11.6.2
- Node.js: 20.17.0
- OS Name: macOS Sequoia 15.6.1
- System Model Name: MacBook Pro M3
- npm config:
; "user" config from /Users/root1/.npmrc
//registry.npmjs.org/:_authToken = (protected)
; "project" config from /Users/root1/code/npm/.npmrc
package-lock = true
; node bin location = /Users/root1/.nvm/versions/node/v20.17.0/bin/node
; node version = v20.17.0
; npm local prefix = /Users/root1/code/npm
; npm version = 11.6.2
; cwd = /Users/root1/code/npm
; HOME = /Users/root1
; Run `npm config ls -l` to show all defaults.nilsalex, arif-farwanto-evidence-care, strafe89, moinloin, thescientist13 and 28 more
Metadata
Metadata
Assignees
Labels
Bugthing that needs fixingthing that needs fixingNeeds Triageneeds review for next stepsneeds review for next steps