URL parsing / input validation
Description
Commit Details
Author: Antoine du Hamel
Date: 2025-12-12 12:34 UTC
Message:
Triage Assessment
Vulnerability Type: URL parsing / input validation
Confidence: MEDIUM
Reasoning:
The commit replaces uses of the potentially user-modifiable URL.parse with the internal URLParse to standardize URL handling and reduce risk from using a mutable global API. This reduces surface area for incorrect URL parsing of untrusted input, which can lead to security issues in downstream logic (e.g., input validation, path handling, or URL normalization). The changes include code paths where user input is parsed as URLs and an ESLint rule to enforce the safer API usage. Vulnerability type: URL parsing/input validation related (not a specific CVE, but an internal hardening of URL handling).
Verification Assessment
Vulnerability Type: URL parsing / input validation
Confidence: MEDIUM
Affected Versions: Versions prior to 25.9.0 (e.g., 25.x before 25.9.0)