[cg-fixer] CVE-2026-4867: bump path-to-regexp to 0.1.13#27080
Open
[cg-fixer] CVE-2026-4867: bump path-to-regexp to 0.1.13#27080
Conversation
Contributor
There was a problem hiding this comment.
Copilot wasn't able to review any files in this pull request.
Files not reviewed (5)
- docs/pnpm-lock.yaml: Language not supported
- pnpm-lock.yaml: Language not supported
- server/gitrest/pnpm-lock.yaml: Language not supported
- server/historian/pnpm-lock.yaml: Language not supported
- server/routerlicious/pnpm-lock.yaml: Language not supported
Contributor
|
🔗 No broken links found! ✅ Your attention to detail is admirable. linkcheck output |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Description
Resolves the CG alert for
path-to-regexp@0.1.12(CVE-2026-4867, high severity). Regenerates five affected pnpm lockfiles so the 0.1.x resolution moves to0.1.13; nopnpm.overridesentry is needed since the dependency graph naturally resolves to the patched version once the lockfiles are regenerated.Only the 0.1.x range is affected by this CVE. Newer major versions (
1.9.0,3.3.0,8.2.0,8.4.2) that coexist in these lockfiles already ship the fix and are untouched.Lockfiles changed
pnpm-lock.yaml—path-to-regexp@0.1.12→0.1.13docs/pnpm-lock.yaml—path-to-regexp@0.1.12→0.1.13server/routerlicious/pnpm-lock.yaml—path-to-regexp@0.1.12→0.1.13server/gitrest/pnpm-lock.yaml—path-to-regexp@0.1.12→0.1.13server/historian/pnpm-lock.yaml—path-to-regexp@0.1.12→0.1.13Overrides
None. An override was applied temporarily to force the lockfile to pick up the patched version, then removed in Step 5 of the
agentic-cg-overrideskill. Re-runningpnpm installwithout the override kept every affected lockfile on0.1.13, confirming the graph naturally resolves to a safe version.Sanity check
path-to-regexp@0.1.12→0.1.13entries. The rootpnpm-lock.yamladditionally grows a set oftypescript@5.9.3-suffixed snapshot contexts for existing eslint/typescript-eslint packages — this is pnpm re-selecting among already-present typescript versions (5.4.5and5.9.3both remain in the lockfile) and introduces no new top-level package versions.Verification
pnpm install --no-frozen-lockfilesucceeds in each affected workspace.grep 'path-to-regexp@' <lockfile>shows only0.1.13(along with unaffected majors1.x,3.x,8.x) in every affected lockfile.Reviewer Guidance
The review process is outlined on this wiki page.
Root
pnpm-lock.yamlhas a larger diff than the others (+295/-16) because pnpm re-resolved the@fluidframework/eslint-config-fluidbinding to thetypescript@5.9.3context that already exists in the lockfile. This is pure resolution context churn — bothtypescript@5.4.5andtypescript@5.9.3were already present before this change.Generated via the
agentic-cg-overrideskill.