Skip to content

Conversation

@BYK
Copy link
Member

@BYK BYK commented Dec 31, 2025

Fix: Upgrade qs to 6.14.1 to address DoS vulnerability

This PR addresses a security vulnerability in the qs package where its arrayLimit bypass in bracket notation (a[]=1&a[]=2) allows Denial-of-Service (DoS) via memory exhaustion.

The qs package was a transitive dependency at version 6.14.0, which is vulnerable. Dependabot could not automatically update it to the patched version 6.14.1.

To mitigate this, qs has been explicitly added to the resolutions section in package.json (and overrides in pnpm-lock.yaml), forcing the installation of version 6.14.1 or higher.

Verification:

  • qs updated from 6.14.0 to 6.14.1.
  • Linting and build processes completed successfully.

Before opening this PR:

  • I added a Changeset Entry with pnpm changeset:add
  • I referenced issues that this PR addresses

Open in Cursor Open in Web

Co-authored-by: burak.kaya <burak.kaya@sentry.io>
@cursor
Copy link

cursor bot commented Dec 31, 2025

Cursor Agent can help with this pull request. Just @cursor in comments and I'll start working on changes in this branch.
Learn more about Cursor Agents

@BYK BYK deployed to Preview December 31, 2025 20:08 — with GitHub Actions Active
@vercel
Copy link

vercel bot commented Dec 31, 2025

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Review Updated (UTC)
spotlightjs Ready Ready Preview, Comment Dec 31, 2025 8:09pm

@BYK BYK marked this pull request as ready for review December 31, 2025 20:32
@BYK BYK merged commit 8363843 into main Dec 31, 2025
18 checks passed
@BYK BYK deleted the cursor/qs-security-vulnerability-fix-4480 branch December 31, 2025 20:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants