All versions of the package bwm-ng are vulnerable to Command Injection due to improper input sanitization in the 'check' function in the bwm-ng.js file. **Note:** To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment.
References
Link Resource
https://security.snyk.io/vuln/SNYK-JS-BWMNG-3175876 Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: snyk

Published: 2023-05-27T05:00:01.547Z

Updated: 2023-05-27T05:00:01.547Z

Reserved: 2023-02-20T10:28:48.924Z


Link: CVE-2023-26129

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2023-05-27T05:15:09.917

Modified: 2023-11-07T04:09:24.900


Link: CVE-2023-26129

JSON object: View

cve-icon Redhat Information

No data.