From 3af29012142e430a6031c6367d87572e9ccac0aa Mon Sep 17 00:00:00 2001 From: Deniz Onur Duzgun <59659739+dduzgun-security@users.noreply.github.com> Date: Fri, 20 Feb 2026 17:36:30 -0500 Subject: [PATCH] Improve GHSA-g4xw-jxrg-5f6m --- .../GHSA-g4xw-jxrg-5f6m.json | 29 +++++++++++++++++-- 1 file changed, 27 insertions(+), 2 deletions(-) diff --git a/advisories/unreviewed/2026/02/GHSA-g4xw-jxrg-5f6m/GHSA-g4xw-jxrg-5f6m.json b/advisories/unreviewed/2026/02/GHSA-g4xw-jxrg-5f6m/GHSA-g4xw-jxrg-5f6m.json index 157325be9b0a5..3295d1a590483 100644 --- a/advisories/unreviewed/2026/02/GHSA-g4xw-jxrg-5f6m/GHSA-g4xw-jxrg-5f6m.json +++ b/advisories/unreviewed/2026/02/GHSA-g4xw-jxrg-5f6m/GHSA-g4xw-jxrg-5f6m.json @@ -6,14 +6,35 @@ "aliases": [ "CVE-2026-0969" ], - "details": "The serialize function used to compile MDX in next-mdx-remote is vulnerable to arbitrary code execution due to insufficient sanitization of MDX content.", + "summary": "Arbitrary code execution in React server-side rendering of untrusted MDX content ", + "details": "The serialize function used to compile MDX in next-mdx-remote is vulnerable to arbitrary code execution due to insufficient sanitization of MDX content. This vulnerability, CVE-2026-0969, is fixed in next-mdx-remote 6.0.0.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "next-mdx-remote" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "4.3.0" + }, + { + "fixed": "6.0.0" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -22,6 +43,10 @@ { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2026-01-arbitrary-code-execution-in-react-server-side-rendering-of-untrusted-mdx-content/77155" + }, + { + "type": "PACKAGE", + "url": "https://github.com/hashicorp/next-mdx-remote" } ], "database_specific": {