-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
About the security vulnerability of dompurify #3825
Comments
@frontHu There is no breaking change documented on dompurify v3 except for losing Internet Explorer support. Depending on your package manager, you might be able to force dompurify v3 to be used on jsPDF, and test your workflow. On yarn, this is done with "overrides", I'm not currently familiar with other package managers. I'm assuming that jsPDF is not willing to upgrade to v3 because it seems to work with Internet Explorer, and it would require a major release if it suddenly drops its support. |
Duplicate of #3819 |
chore(deps): resolve outstanding high and moderate security vulnerabilities Let's fix up the remaining high and moderate severity vulnerabilities. This goes through and cherry-picks commits from dependabot PRs and combines it with a few that had to be manually fixed. 🚀 Currently on Dev as v3.2.3h 🚀 ## Changes ### Dependabot cherry-picked commits - micromatch from 4.0.7 to 4.0.8 - nanoid from 3.3.7 to 3.3.8 - path-to-regexp from 1.8.0 to 1.9.0 - @babel/runtime from 7.24.8 to 7.26.10 - vite from 5.4.7 to 5.4.12 - elliptic from 6.5.6 to 6.6.1 ### Manual dependency bumps - chore(deps): resolve esbuild to 0.25.0 - see vitejs/vite#19412 for explanation - chore(deps): resolve dompurify to 3.2.4 - see parallax/jsPDF#3825 for explanation - chore(deps): resolve canvg to 3.0.11 - see parallax/jsPDF#3834 for explanation - bumping this to 3.0.11 won't get rid of the dependabot alert, but does fix the vulnerability. We'll wait for [the jspdf patch](parallax/jsPDF#3834). ## Testing 1. Do the tests still pass on Dev? _Looks like only the expected tests to fail on Dev are failing_  2. Does the site still behave normally?
I use the fixed version 0.10.2 of html2pdf.js, but the security software scanned and found that [email protected], which this version depends on, has a security vulnerability. Do I need to upgrade dompurify to the latest version?
The text was updated successfully, but these errors were encountered: