From 16bc3881fc7813c5862fc094f1c8ae0990ac8781 Mon Sep 17 00:00:00 2001 From: Henrique Cabral Date: Thu, 5 Mar 2026 17:12:14 -0300 Subject: [PATCH 1/2] New Vuln: Improper Input Validation in @atomicfi/transact-javascript --- input/new.json | 33 +++++++++++++++++++++------------ 1 file changed, 21 insertions(+), 12 deletions(-) diff --git a/input/new.json b/input/new.json index 87646b9a..2a0a8bbc 100644 --- a/input/new.json +++ b/input/new.json @@ -1,15 +1,24 @@ { - "package_name": "", - "patch_versions": [], - "vulnerable_ranges": [], - "cwe": [], - "tldr": "", - "doest_this_affect_me": "", - "how_to_fix": "", - "vulnerable_to": "", + "package_name": "@atomicfi/transact-javascript", + "patch_versions": [ + "3.0.11" + ], + "vulnerable_ranges": [ + [ + "3.0.10", + "3.0.10" + ] + ], + "cwe": [ + "CWE-20" + ], + "tldr": "Affected versions of this package allowed unvalidated user-controlled URLs to be passed directly to `window.open`, enabling arbitrary schemes such as `javascript:` or `data:` to be executed in a new browser context. This could allow an attacker to craft a malicious `payload.url` that executes JavaScript or redirects users to phishing pages when the link is opened. By injecting a specially crafted URL into the event handler, an attacker could trigger client-side script execution or malicious navigation. The patch mitigates this by parsing the URL and restricting navigation strictly to the `https:` protocol.", + "doest_this_affect_me": "You are affected if you are using a version that falls within the vulnerable range.", + "how_to_fix": "Upgrade the `@atomicfi/transact-javascript` library to the patch version.", + "vulnerable_to": "Improper Input Validation", "related_cve_id": "", - "language": "", - "severity_class": "", - "aikido_score": 0, - "changelog": "" + "language": "JS", + "severity_class": "MEDIUM", + "aikido_score": 48, + "changelog": "https://github.com/atomicfi/atomic-transact-javascript/releases/tag/3.0.11" } From 7e3d4cb39865e9689a29c0fc20dcf3f4c0b0c304 Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" Date: Fri, 6 Mar 2026 09:06:01 +0000 Subject: [PATCH 2/2] Move new vulnerability to vulnerabilities/AIKIDO-2026-10303.json and reset new.json template --- input/new.json | 33 ++++++++++---------------- vulnerabilities/AIKIDO-2026-10303.json | 26 ++++++++++++++++++++ 2 files changed, 38 insertions(+), 21 deletions(-) create mode 100644 vulnerabilities/AIKIDO-2026-10303.json diff --git a/input/new.json b/input/new.json index 2a0a8bbc..87646b9a 100644 --- a/input/new.json +++ b/input/new.json @@ -1,24 +1,15 @@ { - "package_name": "@atomicfi/transact-javascript", - "patch_versions": [ - "3.0.11" - ], - "vulnerable_ranges": [ - [ - "3.0.10", - "3.0.10" - ] - ], - "cwe": [ - "CWE-20" - ], - "tldr": "Affected versions of this package allowed unvalidated user-controlled URLs to be passed directly to `window.open`, enabling arbitrary schemes such as `javascript:` or `data:` to be executed in a new browser context. This could allow an attacker to craft a malicious `payload.url` that executes JavaScript or redirects users to phishing pages when the link is opened. By injecting a specially crafted URL into the event handler, an attacker could trigger client-side script execution or malicious navigation. The patch mitigates this by parsing the URL and restricting navigation strictly to the `https:` protocol.", - "doest_this_affect_me": "You are affected if you are using a version that falls within the vulnerable range.", - "how_to_fix": "Upgrade the `@atomicfi/transact-javascript` library to the patch version.", - "vulnerable_to": "Improper Input Validation", + "package_name": "", + "patch_versions": [], + "vulnerable_ranges": [], + "cwe": [], + "tldr": "", + "doest_this_affect_me": "", + "how_to_fix": "", + "vulnerable_to": "", "related_cve_id": "", - "language": "JS", - "severity_class": "MEDIUM", - "aikido_score": 48, - "changelog": "https://github.com/atomicfi/atomic-transact-javascript/releases/tag/3.0.11" + "language": "", + "severity_class": "", + "aikido_score": 0, + "changelog": "" } diff --git a/vulnerabilities/AIKIDO-2026-10303.json b/vulnerabilities/AIKIDO-2026-10303.json new file mode 100644 index 00000000..a1ce21f0 --- /dev/null +++ b/vulnerabilities/AIKIDO-2026-10303.json @@ -0,0 +1,26 @@ +{ + "package_name": "@atomicfi/transact-javascript", + "patch_versions": [ + "3.0.11" + ], + "vulnerable_ranges": [ + [ + "3.0.10", + "3.0.10" + ] + ], + "cwe": [ + "CWE-20" + ], + "tldr": "Affected versions of this package allowed unvalidated user-controlled URLs to be passed directly to `window.open`, enabling arbitrary schemes such as `javascript:` or `data:` to be executed in a new browser context. This could allow an attacker to craft a malicious `payload.url` that executes JavaScript or redirects users to phishing pages when the link is opened. By injecting a specially crafted URL into the event handler, an attacker could trigger client-side script execution or malicious navigation. The patch mitigates this by parsing the URL and restricting navigation strictly to the `https:` protocol.", + "doest_this_affect_me": "You are affected if you are using a version that falls within the vulnerable range.", + "how_to_fix": "Upgrade the `@atomicfi/transact-javascript` library to the patch version.", + "vulnerable_to": "Improper Input Validation", + "related_cve_id": "", + "language": "JS", + "severity_class": "MEDIUM", + "aikido_score": 48, + "changelog": "https://github.com/atomicfi/atomic-transact-javascript/releases/tag/3.0.11", + "last_modified": "2026-03-06", + "published": "2026-03-06" +}