Skip to content

feat: upgrade simple-oauth2 from 2.5.2 to 5.0.0

171a689
Select commit
Loading
Failed to load commit list.
Closed

[Snyk] Upgrade simple-oauth2 from 2.5.2 to 5.0.0 #461

feat: upgrade simple-oauth2 from 2.5.2 to 5.0.0
171a689
Select commit
Loading
Failed to load commit list.
Debricked / Vulnerability analysis completed Mar 31, 2026 in 24s

An automation triggered a pipeline warning

Found 55 vulnerabilities. An additional 0 vulnerabilities have been marked as unaffected.

Output from Automations

4 rules were checked:


If a new dependency is added where the license risk is at least medium

then notify all users in the group admins by email

📤 The rule triggered for the following dependencies, causing an email notification. Manage rule

Dependency Dependency Licenses
node-forge (npm) GPL-2.0-only
node-forge (npm) GPL-2.0-only
node-forge (npm) GPL-2.0-only
node-forge (npm) GPL-2.0-only


If a dependency contains a vulnerability which has not been marked as unaffected and which has not triggered this rule for this dependency before

then notify all users in the group admins by email

📤 The rule triggered for the following vulnerabilities, causing an email notification. Manage rule

Vulnerability CVSS2 CVSS3 CVSS4 Dependency Dependency Licenses
CVE-2024-11831 N/A 5.4 N/A serialize-javascript (npm) BSD-3-Clause
CVE-2024-55565 N/A 4.3 N/A nanoid (npm) MIT


If there is a dependency where the license risk is at least high

then send a pipeline warning

⚠️ The rule triggered for the following dependencies, causing a pipeline warning. Manage rule

Dependency Dependency Licenses
node-forge (npm) GPL-2.0-only
node-forge (npm) GPL-2.0-only
node-forge (npm) GPL-2.0-only
node-forge (npm) GPL-2.0-only


If a dependency contains a vulnerability which has not been marked as unaffected

then send a pipeline warning

⚠️ The rule triggered for the following vulnerabilities, causing a pipeline warning. Manage rule

Vulnerability CVSS2 CVSS3 CVSS4 Dependency Dependency Licenses
CVE-2024-57965 N/A 9.8 N/A axios (npm) MIT
CVE-2024-57965 N/A 9.8 N/A axios (npm) MIT
CVE-2025-7783 N/A N/A 9.4 form-data (npm) MIT
CVE-2025-7783 N/A N/A 9.4 form-data (npm) MIT
CVE-2026-33228 N/A 9.8 8.9 flatted (npm) ISC
CVE-2025-46653 N/A 8.8 N/A formidable (npm) MIT
CVE-2025-66031 N/A 7.5 8.7 node-forge (npm) GPL-2.0-only
CVE-2026-33151 N/A N/A 8.7 socket.io-parser (npm) MIT
CVE-2026-26996 N/A 7.5 8.7 minimatch (npm) BlueOak-1.0.0
CVE-2025-12816 N/A 8.6 N/A node-forge (npm) GPL-2.0-only
CVE-2026-23745 N/A 6.1 8.2 tar (npm) ISC
CVE-2026-24842 N/A 8.2 N/A tar (npm) ISC
CVE-2026-29786 N/A 6.3 8.2 tar (npm) ISC
CVE-2026-31802 N/A 5.5 8.2 tar (npm) ISC
CVE-2025-27152 N/A 5.3 7.7 axios (npm) MIT
CVE-2025-27152 N/A 5.3 7.7 axios (npm) MIT
CVE-2024-52798 N/A N/A 7.7 path-to-regexp (npm) MIT
CVE-2024-21538 N/A 7.5 7.7 cross-spawn (npm) MIT
CVE-2024-39338 N/A 7.5 N/A axios (npm) MIT
CVE-2026-25639 N/A 7.5 N/A axios (npm) MIT
CVE-2025-65945 N/A 7.5 N/A jws (npm) MIT
CVE-2024-37890 N/A 7.5 N/A ws (npm) MIT
CVE-2024-45590 N/A 7.5 N/A body-parser (npm) MIT
CVE-2026-32141 N/A 7.5 N/A flatted (npm) ISC
CVE-2024-4068 N/A 7.5 N/A braces (npm) MIT
CVE-2026-25639 N/A 7.5 N/A axios (npm) MIT
CVE-2024-45590 N/A 7.5 N/A body-parser (npm) MIT
CVE-2026-27903 N/A 7.5 N/A minimatch (npm) BlueOak-1.0.0
CVE-2024-45296 N/A 7.5 N/A path-to-regexp (npm) MIT
CVE-2024-37890 N/A 7.5 N/A ws (npm) MIT
CVE-2025-58754 N/A 7.5 N/A axios (npm) MIT
CVE-2026-27904 N/A 7.5 N/A minimatch (npm) BlueOak-1.0.0
CVE-2026-26960 N/A 7.1 N/A tar (npm) ISC
CVE-2025-13465 N/A 5.3 6.9 lodash (npm) MIT
CVE-2024-28863 N/A 6.5 N/A tar (npm) ISC
CVE-2023-45857 N/A 6.5 N/A axios (npm) MIT
CVE-2024-28849 N/A 6.5 N/A follow-redirects (npm) MIT
CVE-2025-66030 N/A 5.3 6.3 node-forge (npm) GPL-2.0-only
CVE-2026-2391 N/A 7.5 6.3 qs (npm) BSD-3-Clause
CVE-2025-15284 N/A 3.7 6.3 qs (npm) BSD-3-Clause
CVE-2025-15284 N/A 3.7 6.3 qs (npm) BSD-3-Clause
CVE-2026-2391 N/A 7.5 6.3 qs (npm) BSD-3-Clause
CVE-2025-15284 N/A 3.7 6.3 qs (npm) BSD-3-Clause
CVE-2026-2391 N/A 7.5 6.3 qs (npm) BSD-3-Clause
CVE-2025-27789 N/A 6.2 N/A @babel/helpers (npm) MIT
CVE-2024-29041 N/A 6.1 N/A express (npm) MIT
CVE-2023-26159 N/A 6.1 N/A follow-redirects (npm) MIT
CVE-2025-62517 N/A 5.9 N/A rollbar (npm) MIT
CVE-2026-23950 N/A 5.9 N/A tar (npm) ISC
CVE-2024-27088 N/A 5.5 N/A es5-ext (npm) ISC
CVE-2024-11831 N/A 5.4 N/A serialize-javascript (npm) BSD-3-Clause
CVE-2025-64718 N/A 5.3 N/A js-yaml (npm) MIT
CVE-2025-54798 N/A 5.3 N/A tmp (npm) MIT
CVE-2024-4067 N/A 5.3 N/A micromatch (npm) MIT
CVE-2024-43800 N/A 4.7 N/A serve-static (npm) MIT
CVE-2024-43796 N/A 4.7 N/A express (npm) MIT
CVE-2024-55565 N/A 4.3 N/A nanoid (npm) MIT
CVE-2025-7339 N/A 3.4 N/A on-headers (npm) MIT
CVE-2025-57325 N/A 7.5 2.9 rollbar (npm) MIT
CVE-2025-69873 N/A 2.9 N/A ajv (npm) MIT
CVE-2024-43799 N/A 4.7 2.3 send (npm) MIT
CVE-2025-5889 2.1 3.1 1.3 brace-expansion (npm) MIT
CVE-2025-5889 2.1 3.1 1.3 brace-expansion (npm) MIT
debricked-335402 N/A N/A N/A diff (npm) BSD-3-Clause
GHSA-5c6j-r48x-rmvq N/A N/A N/A serialize-javascript (npm) BSD-3-Clause
CVE-2024-47764 N/A N/A N/A cookie (npm) MIT