Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
109 changes: 108 additions & 1 deletion audit-report.json
Original file line number Diff line number Diff line change
@@ -1,4 +1,111 @@
{
"advisories": [],
"advisories": {
"filament/tables": [
{
"advisoryId": "PKSA-5bdf-2x61-v43c",
"packageName": "filament/tables",
"affectedVersions": ">=5.0.0,<5.3.5|>=4.0.0,<4.8.5",
"title": "Filament Unvalidated Range and Values summarizer values can be used for XSS",
"cve": "CVE-2026-33080",
"link": "https://github.com/advisories/GHSA-vv3x-j2x5-36jc",
"reportedAt": "2026-03-18T20:07:24+00:00",
"sources": [
{
"name": "GitHub",
"remoteId": "GHSA-vv3x-j2x5-36jc"
}
],
"severity": "high"
}
],
"league/commonmark": [
{
"advisoryId": "PKSA-21fb-n1x5-5nf7",
"packageName": "league/commonmark",
"affectedVersions": ">=2.3.0,<=2.8.1",
"title": "league/commonmark has an embed extension allowed_domains bypass",
"cve": "CVE-2026-33347",
"link": "https://github.com/advisories/GHSA-hh8v-hgvp-g3f5",
"reportedAt": "2026-03-19T19:04:24+00:00",
"sources": [
{
"name": "GitHub",
"remoteId": "GHSA-hh8v-hgvp-g3f5"
}
],
"severity": "medium"
},
{
"advisoryId": "PKSA-2cx9-ynrq-qdk3",
"packageName": "league/commonmark",
"affectedVersions": ">=2.0.0,<=2.8.0",
"title": "CommonMark has DisallowedRawHtml extension bypass via whitespace in HTML tag names",
"cve": "CVE-2026-30838",
"link": "https://github.com/advisories/GHSA-4v6x-c7xx-hw9f",
"reportedAt": "2026-03-06T23:27:03+00:00",
"sources": [
{
"name": "GitHub",
"remoteId": "GHSA-4v6x-c7xx-hw9f"
}
],
"severity": "medium"
}
],
"phpunit/phpunit": [
{
"advisoryId": "PKSA-z3gr-8qht-p93v",
"packageName": "phpunit/phpunit",
"affectedVersions": ">=12.0.0,<12.5.8|>=11.0.0,<11.5.50|>=10.0.0,<10.5.62|>=9.0.0,<9.6.33|<8.5.52",
"title": "PHPUnit Vulnerable to Unsafe Deserialization in PHPT Code Coverage Handling",
"cve": "CVE-2026-24765",
"link": "https://github.com/advisories/GHSA-vvj3-c3rp-c85p",
"reportedAt": "2026-01-27T22:26:22+00:00",
"sources": [
{
"name": "GitHub",
"remoteId": "GHSA-vvj3-c3rp-c85p"
}
],
"severity": "high"
}
],
"psy/psysh": [
{
"advisoryId": "PKSA-4s4z-t146-6123",
"packageName": "psy/psysh",
"affectedVersions": "<=0.11.22|>=0.12.0,<=0.12.18",
"title": "PsySH has Local Privilege Escalation via CWD .psysh.php auto-load",
"cve": "CVE-2026-25129",
"link": "https://github.com/advisories/GHSA-4486-gxhx-5mg7",
"reportedAt": "2026-01-30T21:28:44+00:00",
"sources": [
{
"name": "GitHub",
"remoteId": "GHSA-4486-gxhx-5mg7"
}
],
"severity": "medium"
}
],
"symfony/process": [
{
"advisoryId": "PKSA-rkkf-636k-qjb3",
"packageName": "symfony/process",
"affectedVersions": ">=8.0,<8.0.5|>=7.4,<7.4.5|>=7.3,<7.3.11|>=6.4,<6.4.33|<5.4.51",
"title": "Symfony's incorrect argument escaping under MSYS2/Git Bash can lead to destructive file operations on Windows",
"cve": "CVE-2026-24739",
"link": "https://github.com/advisories/GHSA-r39x-jcww-82v6",
"reportedAt": "2026-01-28T21:28:10+00:00",
"sources": [
{
"name": "GitHub",
"remoteId": "GHSA-r39x-jcww-82v6"
}
],
"severity": "medium"
}
]
},
Comment on lines +2 to +109
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟠 Major

🧩 Analysis chain

🏁 Script executed:

#!/bin/bash
set -euo pipefail

# Verify installed versions from composer.lock for packages listed in audit-report.json
python - <<'PY'
import json, pathlib

lock_path = pathlib.Path("composer.lock")
audit_path = pathlib.Path("audit-report.json")

lock = json.loads(lock_path.read_text())
audit = json.loads(audit_path.read_text())

pkgs = {}
for section in ("packages", "packages-dev"):
    for p in lock.get(section, []):
        pkgs[p["name"]] = p["version"]

targets = list(audit.get("advisories", {}).keys())
print("Package versions in composer.lock:")
for name in targets:
    print(f"- {name}: {pkgs.get(name, 'NOT INSTALLED')}")

print("\nAdvisory IDs:")
for name, items in audit.get("advisories", {}).items():
    ids = ", ".join(x.get("advisoryId","?") for x in items)
    print(f"- {name}: {ids}")
PY

Repository: InvoicePlane/InvoicePlane-v2

Length of output: 461


Regenerate audit-report.json from composer.lock before merge

The security report contains advisories that no longer apply. All listed packages have been upgraded to versions that resolve their respective vulnerabilities according to the affected version ranges specified. Commit an updated report that reflects the current security status of the installed dependencies.

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@audit-report.json` around lines 2 - 109, The audit-report.json still contains
obsolete entries under the "advisories" section (e.g., "filament/tables",
"league/commonmark", "phpunit/phpunit", etc.); regenerate the report from the
current composer.lock so it reflects installed versions (run your project's
Composer audit and export/update audit-report.json), verify the "advisories"
block no longer lists fixed vulnerabilities, and commit the regenerated
audit-report.json.

"abandoned": []
}
Loading
Loading