Developer Kit
Dependency CVE Auditor
Audits project dependencies against NVD and GitHub Advisory Database, producing a CVE report ranked by CVSS score with patch guidance. Useful for catching known vulnerabilities before they reach production. Backend and full-stack engineers responsible for their own dependency health, security engineers preparing for SOC 2 or enterprise vendor reviews, and indie builders who cannot staff a dedicated AppSec role. from npm supply-chain incidents to Python package typosquatting to the widespread Log4Shell fallout. New advisories land weekly. Manually auditing dependencies is tedious and inconsistent, and tools like `npm audit` or `pip-audit` produce raw output that is hard to triage without context. Teams miss upgrades because the prioritization story is flat: a medium CVE in a critical package often matters more than a critical CVE in a dev dependency, but raw audit output does not communicate that.
One-Time Purchase
$19.99
Dependency CVE Audit — package.json (Node 20)
Audited: 2025-06-11 · Manifest: package.json · Lockfile: package-lock.json (v3)
Audit Summary
| Metric | Count | |---|---| | Total packages scanned | 214 | | Direct dependencies | 38 | | Transitive dependencies | 176 | | Critical CVEs | 3 | | High CVEs | 7 | | Medium CVEs | 11 | | Low CVEs | 4 | | CISA KEV flagged | 2 | | Production-affecting | 19 | | Dev-only | 6 | | CVEs with no patch available | 2 |
Per-CVE Findings
🔴 CRITICAL
CVE-2024-21538 · NVD · GHSA-3xgq-45jj-v275
- CVSS v3: 9.8 — Critical
- Package:
cross-spawn· Affected:< 7.0.5· Installed:7.0.3· Fixed:7.0.5 - Classification: Transitive · Path:
jest-cli→jest-runner→cross-spawn - Environment: Dev-only
- KEV Flag: No
- Vulnerability: ReDoS via crafted shell argument string; denial-of-service in long-running CI processes
- Upgrade Path:
cross-spawnis not a direct dependency. Override inpackage.json:
Then run"overrides": { "cross-spawn": "^7.0.5" }npm install. Verify withnpm ls cross-spawn. - Breaking Changes: None documented between 7.0.3 → 7.0.5 (patch release).
CVE-2025-29927 · NVD · GHSA-f82v-jwr5-mffw
- CVSS v3: 9.1 — Critical
- Package:
next· Affected:< 14.2.25 || >=15.0.0 < 15.2.3· Installed:14.2.10· Fixed:14.2.25 - Classification: Direct · Production
- KEV Flag: ⚠️ CISA KEV — actively exploited in the wild
- Vulnerability: Middleware authorization bypass via
x-middleware-subrequestheader manipulation; unauthenticated access to protected routes - Upgrade Path:
npm install next@14.2.25 - Breaking Changes: No API-level breaking changes in this patch range; review custom middleware logic as an internal header-handling fix may affect edge cases with deeply nested subrequests.
CVE-2024-45813 · NVD · GHSA-952p-6rrq-rcjv
- CVSS v3: 9.0 — Critical
- Package:
find-my-way· Affected:< 8.2.2· Installed:8.1.0· Fixed:8.2.2 - Classification: Transitive · Path:
fastify→find-my-way - Environment: Production
- KEV Flag: ⚠️ CISA KEV — actively exploited in the wild
- Vulnerability: Route parameter regex allows catastrophic backtracking; remote DoS via crafted URL path
- Upgrade Path:
find-my-wayis not directly installable in isolation from this path. Updatefastifyto^4.28.1, which pullsfind-my-way@8.2.2:
Alternatively, add an override:npm install fastify@4.28.1"overrides": { "find-my-way": "^8.2.2" }and validate no route registration regressions. - Breaking Changes:
fastify4.27 → 4.28 includes one deprecation ofreply.sentin favor ofreply.headerSent; not a removal, but emit a deprecation warning in tests.
🟠 HIGH
CVE-2024-55565 · NVD · GHSA-mwcw-c2x4-8c55
- CVSS v3: 7.5 — High
- Package:
nanoid· Affected:< 3.3.8· Installed:3.3.6· Fixed:3.3.8 - Classification: Transitive · Path:
vite→postcss→nanoid - Environment: Dev-only
- KEV Flag: No
- Vulnerability: Predictable ID generation in certain character-set configurations; reduces entropy below acceptable thresholds
- Upgrade Path: Add override:
"overrides": { "nanoid": "^3.3.8" }and runnpm install. - Breaking Changes: None documented (patch release).
CVE-2025-27789 · NVD · GHSA-v6h2-p8h4-qcjw
- CVSS v3: 7.3 — High
- Package:
axios· Affected:< 1.7.9· Installed:1.6.8· Fixed:1.7.9 - Classification: Direct · Production
- KEV Flag: No
- Vulnerability: SSRF via malformed URL with embedded credentials; attacker-controlled request targets internal network endpoints
- Upgrade Path:
npm install axios@1.7.9 - Breaking Changes:
axios1.6 → 1.7 deprecates thedatashorthand onGETrequests. Audit usages ofaxios.get(url, { data: ... })— these will log a deprecation warning but still function.
(5 additional High CVEs in full report — truncated in sample view)
Prioritized Upgrade Queue
| Priority | Package | Fix | Reason |
|---|---|---|---|
| 1 | next@14.2.25 | Direct · npm install | CISA KEV · CVSS 9.1 · auth bypass in production |
| 2 | fastify@4.28.1 | Direct · resolves transitive | CISA KEV · CVSS 9.0 · remote DoS in production |
| 3 | axios@1.7.9 | Direct · npm install | CVSS 7.3 · SSRF · production |
| 4 | cross-spawn override ^7.0.5 | Transitive override | CVSS 9.8 · dev-only · low runtime risk, high CVSS |
| 5 | nanoid override ^3.3.8 | Transitive override | CVSS 7.5 · dev-only |
Ready-to-Submit PR Body
## chore(deps): patch critical and high CVEs — security audit 2025-06-11
### Changes
- `next` 14.2.10 → **14.2.25** (CVE-2025-29927, CVSS 9.1, CISA KEV — middleware auth bypass)
- `fastify` 4.27.0 → **4.28.1** (CVE-2024-45813, CVSS 9.0, CISA KEV — route regex DoS via transitive `find-my-way`)
- `axios` 1.6.8 → **1.7.9** (CVE-2025-27789, CVSS 7.3 — SSRF via malformed URL)
- Added `overrides.cross-spawn ^7.0.5` (CVE-2024-21538, CVSS 9.8 — ReDoS in CI only)
- Added `overrides.nanoid ^3.3.8` (CVE-2024-55565, CVSS 7.5 — entropy reduction in dev tooling)
### Testing
- [ ] `npm run test:unit` green
- [ ] `npm run test:e2e` green against staging
- [ ] Confirm `npm ls find-my-way` resolves `8.2.2`
- [ ] Confirm `npm ls cross-spawn` resolves `7.0.5`
- [ ] Review any `reply.sent` deprecation warnings in fastify test output
### Notes
- `axios` 1.7 deprecates `GET` with `data` payload — no removal, monitor deprecation warnings
- Advisory presence does not confirm active exploitation in this codebase — CISA KEV flags indicate known in-the-wild exploitation generally
- `next` middleware edge-case review recommended for subrequest-heavy auth flows
Refs: CVE-2025-29927, CVE-2024-45813, CVE-2025-27789, CVE-2024-21538, CVE-2024-55565
No-Fix Queue — Monitor & Mitigate
CVE-2024-52798 · NVD · GHSA-rhx6-c78j-4q9w
- CVSS v3: 5.3 — Medium
- Package:
path-to-regexp· Affected:0.1.x(all) · Installed:0.1.10· Fixed: None — no patch available for the 0.1.x line - Status: No-fix · Monitor
- Classification: Transitive · Path:
express→path-to-regexp - Vulnerability: ReDoS via backtracking on certain named parameter patterns
- Mitigation: (1) Validate and sanitize all incoming route strings at the application boundary before passing to Express handlers. (2) Monitor for
path-to-regexp0.2.x or an Express patch release that upgrades this dependency. (3) Consider rate-limiting on route-heavy endpoints as a defense-in-depth measure. Do not force-override topath-to-regexp@6.x— that version has a completely different API and is incompatible with Express 4.x internals.
CVE-2025-30208 · NVD · GHSA-x574-m823-4x7w
- CVSS v3: 4.3 — Medium
- Package:
vite· Affected:< 6.2.4· Installed:5.4.2· Fixed:6.2.4(major version bump required) - Status: No direct patch on v5 line · Monitor
- Classification: Direct · Dev-only
- Vulnerability: Arbitrary file read via crafted
/@fs/URL; exploitable only if Vite dev server is exposed to untrusted networks - Mitigation: (1) Ensure Vite dev server is bound to
localhostonly (server.host: falseinvite.config.ts) — this eliminates the attack surface for this CVE in typical usage. (2) Do not expose dev server ports externally in CI or staging environments. (3) Track Vite 5.x for a backport patch; a v6 upgrade is available but constitutes a major-version change with significant config and plugin API differences — evaluate separately outside this security patch cycle.
Full audit log and raw advisory JSON available as artifacts. Re-run recommended after any npm install that modifies the lockfile.
View full sample →
All sales final. No refunds on digital products.
Includes support for Claude Code, Codex, and OpenClaw in the same license.
What You Get With This Skill
Audits project dependencies against NVD and GitHub Advisory Database, producing a CVE report ranked by CVSS score with patch guidance. Useful for catching known vulnerabilities before they reach production.
All ClearPoint Nexus Skills Include
- Production-ready workflow packaging for three supported platforms.
- Reusable structure designed for repeatable operator tasks.
- Clear deliverable format, not just raw prompt output.
Related Skills
$19.99
One-time license
$19.99
One-time license
$19.99
One-time license