svix is vulnerable to Improper Input Validation
17
Low Risk
Affected versions of the package do not properly sanitize URLs configured for operational server webhooks. The SVIX_OPERATIONAL_WEBHOOK_ADDRESS value is used without validation or sanitization, allowing potentially unsafe or malformed URLs to be added and used by the server.
You are affected if you are using a version that falls within the vulnerable range.
svix is vulnerable to Improper Input Validation in versions 0.61.0 - 1.64.1.
Upgrade the com.svix:svix library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant