@nx/workspace is vulnerable to Command Injection
79
High Risk
Affected versions of this package allow OS command injection because user-controlled input flows unsanitized into execSync via string interpolation when resolving npm package versions. An attacker can supply a crafted --preset value containing shell metacharacters to execute arbitrary commands on the host during create-nx-workspace. It can lead to full compromise of the developer machine or CI runner (RCE), including data exfiltration or malware installation. The issue arises from using shell command concatenation instead of validating input and invoking commands with argument arrays.
You are affected if you are using a version that falls within the vulnerable range.
@nx/workspace is vulnerable to Command Injection in versions 16.0.0 - 22.4.4.
Upgrade the @nx/workspace library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant