-
-
Notifications
You must be signed in to change notification settings - Fork 6.5k
fix(deps): upgrade glob to fix CVE-2025-64756 #11784
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(deps): upgrade glob to fix CVE-2025-64756 #11784
Conversation
Upgrade glob from version 10.4.5 to 10.5.0 to address security vulnerability CVE-2025-64756. The vulnerability allows command injection through the glob CLI -c/--cmd option when processing files with malicious names. This affects versions 10.3.7 to 10.4.x. The issue has been patched in version 10.5.0. CVE-2025-64756
PR Compliance Guide 🔍Below is a summary of compliance checks for this PR:
Compliance status legend🟢 - Fully Compliant🟡 - Partial Compliant 🔴 - Not Compliant ⚪ - Requires Further Human Verification 🏷️ - Compliance label |
|||||||||||||||||||||||
WalkthroughA dependency version bump for the "glob" package from ^10.4.5 to ^10.5.0 in Changes
Estimated code review effort🎯 1 (Trivial) | ⏱️ ~2 minutes
Possibly related issues
Suggested reviewers
Poem
Pre-merge checks and finishing touches✅ Passed checks (3 passed)
✨ Finishing touches
🧪 Generate unit tests (beta)
Tip 📝 Customizable high-level summaries are now available in beta!You can now customize how CodeRabbit generates the high-level summary in your pull requests — including its content, structure, tone, and formatting.
Example instruction:
Note: This feature is currently in beta for Pro-tier users, and pricing will be announced later. Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
PR Code Suggestions ✨No code suggestions found for the PR. |
|
See #11776 |
commit: |
|
Will 0.3.28 be released soon so this patch can be released? |
|
@danielelkington you don't need this patch, please check #11776 (comment). |
Co-authored-by: Oleg "OSA413" Sokolov <OSA413@users.noreply.github.com>
Co-authored-by: Oleg "OSA413" Sokolov <OSA413@users.noreply.github.com>
User description
Description of change
This PR upgrades the
globpackage from version10.4.5to10.5.0to address security vulnerability CVE-2025-64756.What the change does:
globdependency inpackage.jsonfrom^10.4.5to^10.5.0package-lock.jsonto reflect the new versionWhy this change is needed:
The current version of
glob(10.4.5) contains a command injection vulnerability (CVE-2025-64756) in its CLI-c/--cmdoption. This vulnerability allows arbitrary command execution when processing files with malicious names. The issue affects versions 10.3.7 to 10.4.x and has been patched in version 10.5.0.CVSS Score: 7.5 (HIGH severity)
How verified:
package.jsonand rannpm installto updatepackage-lock.jsonnpm run compileglobversion updated to 10.5.0 inpackage-lock.jsonCurrent behavior:
TypeORM uses
globversion 10.4.5 which is vulnerable to CVE-2025-64756.New behavior:
TypeORM uses
globversion 10.5.0 which includes the security patch for CVE-2025-64756.References:
Pull-Request Checklist
masterbranchFixes #00000(N/A - security fix, no related issue)PR Type
Bug fix
Description
Upgrades
globdependency from 10.4.5 to 10.5.0Addresses CVE-2025-64756 command injection vulnerability
Prevents arbitrary command execution via malicious filenames
HIGH severity security patch (CVSS 7.5)
Diagram Walkthrough
File Walkthrough
package.json
Upgrade glob dependency to patched versionpackage.json
globdependency version from^10.4.5to^10.5.0Summary by CodeRabbit
✏️ Tip: You can customize this high-level summary in your review settings.