-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from the filterSensitive() function's parameter handling logic. The patch shows the security fix: 1. Combined check for both removal and replacement parameters in a single condition, 2. Removal of conditional value replacement in favor of post-processing enforcement of secure values, 3. Added mandatory injection of replacement parameters. The test cases demonstrate that previous versions allowed dangerous values (TRue/Yes) for security-sensitive parameters, while the patched version forces them to 'false' regardless of input.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.inlong:manager-pojo | maven | >= 1.4.0, < 1.9.0 | 1.9.0 |
Ongoing coverage of React2Shell