The following table lists the changes that have been made to the
CVE-2024-11831 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by [email protected]Feb. 10, 2025
Action Type Old Value New Value Added Description A flaw was found in npm-serialize-javascript. The vulnerability occurs because the serialize-javascript module does not properly sanitize certain inputs, such as regex or other JavaScript object types, allowing an attacker to inject malicious code. This code could be executed when deserialized by a web browser, causing Cross-site scripting (XSS) attacks. This issue is critical in environments where serialized data is sent to web clients, potentially compromising the security of the website or web application using this package. Added CVSS V3.1 AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Added CWE CWE-79 Added Reference https://access.redhat.com/security/cve/CVE-2024-11831 Added Reference https://bugzilla.redhat.com/show_bug.cgi?id=2312579 Added Reference https://github.com/yahoo/serialize-javascript/commit/f27d65d3de42affe2aac14607066c293891cec4e Added Reference https://github.com/yahoo/serialize-javascript/pull/173