Skip to content

chore: fix security vulnerabilities via Go upgrades and npm overrides (WH-3695)#110

Merged
danielBWeka merged 9 commits intorelease/v0.4from
danielb/fix-security-mend-vulnerabilities-WH-3695
Feb 8, 2026
Merged

chore: fix security vulnerabilities via Go upgrades and npm overrides (WH-3695)#110
danielBWeka merged 9 commits intorelease/v0.4from
danielb/fix-security-mend-vulnerabilities-WH-3695

Conversation

@danielBWeka
Copy link
Collaborator

@danielBWeka danielBWeka commented Jan 28, 2026

Security Vulnerabilities Fixed (58 Total)

Critical (1)

CVE Package CVSS Fix
CVE-2025-13465 lodash 4.17.21 9.9 Removed with CRA → Vite migration

High (21)

CVE Package CVSS Fix
CVE-2025-53547 helm.sh/helm/v3 v3.16.1 8.5 go.mod → v3.19.0
CVE-2024-33883 ejs 3.1.9 8.8 Removed with CRA → Vite migration
CVE-2025-7783 form-data 3.0.1 8.7 Removed with CRA → Vite migration
CVE-2025-12816 node-forge 1.3.1 8.6 Removed with CRA → Vite migration
CVE-2025-66031 node-forge 1.3.1 7.5 Removed with CRA → Vite migration
CVE-2025-52881 opencontainers/selinux v1.11.0 7.5 go.mod (transitive via helm)
CVE-2025-47913 golang.org/x/crypto v0.31.0 7.5 go.mod → v0.41.0
CVE-2025-22869 golang.org/x/crypto v0.31.0 7.5 go.mod → v0.41.0
CVE-2025-22868 golang.org/x/oauth2 v0.21.0 7.5 go.mod → v0.30.0
CVE-2025-15284 qs 6.11.0 7.5 Removed with CRA → Vite migration
CVE-2024-52798 path-to-regexp 0.1.7 7.5 Removed with CRA → Vite migration
CVE-2024-45590 body-parser 1.20.1 7.5 Removed with CRA → Vite migration
CVE-2024-45296 path-to-regexp 0.1.7 7.5 Removed with CRA → Vite migration
CVE-2024-4068 braces 3.0.2 7.5 Removed with CRA → Vite migration
CVE-2024-37890 ws 8.14.2 / 7.5.9 7.5 Removed with CRA → Vite migration
CVE-2024-21538 cross-spawn 7.0.3 7.5 Removed with CRA → Vite migration
CVE-2024-21536 http-proxy-middleware 2.0.6 7.5 Removed with CRA → Vite migration
CVE-2021-3803 nth-check 1.0.2 7.5 Removed with CRA → Vite migration
CVE-2024-29180 webpack-dev-middleware 5.3.3 7.4 Removed with CRA → Vite migration
CVE-2023-26159 follow-redirects 1.15.3 7.3 Removed with CRA → Vite migration

Medium (33)

CVE Package CVSS Fix
CVE-2025-55199 helm.sh/helm/v3 v3.16.1 6.5 go.mod → v3.19.0
CVE-2025-55198 helm.sh/helm/v3 v3.16.1 6.5 go.mod → v3.19.0
CVE-2025-32387 helm.sh/helm/v3 v3.16.1 6.5 go.mod → v3.19.0
CVE-2025-32386 helm.sh/helm/v3 v3.16.1 6.5 go.mod → v3.19.0
CVE-2025-30360 webpack-dev-server 4.15.1 6.5 Removed with CRA → Vite migration
CVE-2024-36620 github.com/docker/docker v25.0.6 6.5 go.mod (transitive via helm)
CVE-2024-28849 follow-redirects 1.15.3 6.5 Removed with CRA → Vite migration
CVE-2024-43788 webpack 5.89.0 6.4 Removed with CRA → Vite migration
CVE-2025-27789 @babel/helpers, @babel/runtime 6.2 Removed with CRA → Vite migration
CVE-2024-47068 rollup 2.79.1 6.1 Removed with CRA → Vite migration
CVE-2024-29041 express 4.18.2 6.1 Removed with CRA → Vite migration
CVE-2024-11831 serialize-javascript 4.0.0 / 6.0.1 5.4 Removed with CRA → Vite migration
CVE-2025-66030 node-forge 1.3.1 5.3 Removed with CRA → Vite migration
CVE-2025-64718 js-yaml 3.14.1 / 4.1.0 5.3 Removed with CRA → Vite migration
CVE-2025-58181 golang.org/x/crypto v0.31.0 5.3 go.mod → v0.41.0
CVE-2025-47914 golang.org/x/crypto v0.31.0 5.3 go.mod → v0.41.0
CVE-2025-30359 webpack-dev-server 4.15.1 5.3 Removed with CRA → Vite migration
CVE-2024-47764 cookie 0.5.0 5.3 Removed with CRA → Vite migration
CVE-2024-4067 micromatch 4.0.5 5.3 Removed with CRA → Vite migration
CVE-2023-44270 postcss 7.0.39 5.3 Removed with CRA → Vite migration
CVE-2024-43800 serve-static 1.15.0 5.0 Removed with CRA → Vite migration
CVE-2024-43799 send 0.18.0 5.0 Removed with CRA → Vite migration
CVE-2024-43796 express 4.18.2 5.0 Removed with CRA → Vite migration
CVE-2025-22870 golang.org/x/net v0.33.0 4.4 go.mod → v0.42.0
CVE-2024-55565 nanoid 3.3.7 4.3 Removed with CRA → Vite migration
CVE-2025-32997 http-proxy-middleware 2.0.6 4.0 Removed with CRA → Vite migration
CVE-2025-32996 http-proxy-middleware 2.0.6 4.0 Removed with CRA → Vite migration

Low (3)

CVE Package CVSS Fix
CVE-2025-7339 on-headers 1.0.2 3.4 Removed with CRA → Vite migration
CVE-2025-5889 brace-expansion 1.1.11 / 2.0.1 3.1 Removed with CRA → Vite migration

Summary

Severity Count Fixed
Critical 1 1
High 21 21
Medium 33 33
Low 3 3
Total 58 58

Fix Methods

Go Updates (go.mod)

  • Go version: 1.23.7 → 1.24.0 (toolchain go1.24.2)
  • helm: v3.16.1 → v3.19.0
  • k8s.io packages: v0.31.1 → v0.34.0
  • golang.org/x/crypto: v0.31.0 → v0.41.0
  • golang.org/x/oauth2: v0.21.0 → v0.30.0
  • golang.org/x/net: v0.33.0 → v0.42.0
  • containerd: v1.7.22 → v1.7.30

Frontend Migration: Create React App → Vite

Migrated the web frontend from Create React App (react-scripts 5.0.1) to Vite 6.x, eliminating all CRA transitive dependencies that contained vulnerabilities.

Before: ~1,500+ npm packages (via react-scripts)
After: ~115 npm packages (via vite)

Note: The web frontend is an optional feature (behind //go:build web tag) and is not included in production builds by default.

Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This pull request addresses 58 security vulnerabilities through Go dependency upgrades and a frontend migration from Create React App to Vite. The changes fix 1 critical, 21 high, 33 medium, and 3 low severity CVEs affecting both Go and npm dependencies.

Changes:

  • Upgraded Go dependencies including helm (v3.16.1 → v3.19.0), golang.org/x/crypto (v0.31.0 → v0.45.0), golang.org/x/oauth2 (v0.21.0 → v0.30.0), and kubernetes libraries (v0.31.x → v0.34.0)
  • Migrated optional web frontend from Create React App to Vite 6.x, removing all CRA-related npm vulnerabilities
  • Updated Go version specification to 1.24.0 with toolchain go1.24.2

Reviewed changes

Copilot reviewed 8 out of 10 changed files in this pull request and generated no comments.

Show a summary per file
File Description
go.mod Updated Go version to 1.24.0 and upgraded direct dependencies including helm, kubernetes, and golang.org packages
go.sum Updated checksums for all upgraded Go dependencies
internal/local/web/frontend/vite.config.js New Vite configuration with React plugin and API proxy to localhost:8080
internal/local/web/frontend/package.json Replaced react-scripts with Vite and updated scripts for dev/build/preview
internal/local/web/frontend/index.html New Vite HTML entry point with script module reference
internal/local/web/frontend/public/index.html Removed Create React App HTML template
internal/local/web/frontend/src/main.jsx Updated import to use .jsx extension for App component
internal/local/web/frontend/src/App.jsx Removed unnecessary comment
internal/local/web/frontend/README.md Updated documentation for Vite migration

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

@danielBWeka danielBWeka marked this pull request as ready for review January 29, 2026 08:42
@danielBWeka danielBWeka changed the title chore: fix security vulnerabilities via Go upgrades and npm overrides chore: fix security vulnerabilities via Go upgrades and npm overrides (WH-3695) Jan 29, 2026
commit 073f477
Author: Daniel Binyamin <daniel.binyamin@weka.io>
Date:   Sun Feb 1 12:51:35 2026 +0200

    chore: GitHub Actions release workflow for homecli (WH-3686) (#113)

    * release github action

    * updates

    * adjustments

    * only release/v.0.4

    * fix vulnerability

    * copilot fixes

commit 8afeca4
Author: Daniel Binyamin <daniel.binyamin@weka.io>
Date:   Sun Feb 1 10:12:00 2026 +0200

    feat: homecli remote-access commands (#109)

    * Add remote session cli commands

    * get image from configMap

    * enable remote access values for LWH

    * copy using sidecar deployment

    * remove http.go

    * fix copy recordings

    * lint + fixes

    * fixes

    * pre-commit

    * fixes 2

    * sort recordings list

    * fix error handling

    * validate tmte server flags

    * fixes 4

    * Squashed commit of the following:

    commit c4606e9
    Merge: a335aa3 511a9db
    Author: vyeveweka <vitalii.yevenko@weka.io>
    Date:   Fri Jan 30 16:39:32 2026 +0200

        Merge pull request #112 from weka/chore/v.yevenko/WH-3694-disable-redis-fix

        chore: disable redis fix

    commit 511a9db
    Author: Vitalii Yevenko <vitalii.yevenko@weka.io>
    Date:   Fri Jan 30 12:23:14 2026 +0200

        disabled redis for LWH

    commit 249a960
    Author: Vitalii Yevenko <vitalii.yevenko@weka.io>
    Date:   Thu Jan 29 22:00:15 2026 +0200

        fixed redis deployment

    commit a335aa3
    Merge: b3e913b 53deac1
    Author: vyeveweka <vitalii.yevenko@weka.io>
    Date:   Thu Jan 29 17:02:26 2026 +0200

        Merge pull request #111 from weka/chore/v.yevenko/WH-3694-disable-redis

        chore: disable redis

    commit 53deac1
    Author: Vitalii Yevenko <vitalii.yevenko@weka.io>
    Date:   Thu Jan 29 14:15:40 2026 +0200

        disable redis

    * fix merge conflict

commit c4606e9
Merge: a335aa3 511a9db
Author: vyeveweka <vitalii.yevenko@weka.io>
Date:   Fri Jan 30 16:39:32 2026 +0200

    Merge pull request #112 from weka/chore/v.yevenko/WH-3694-disable-redis-fix

    chore: disable redis fix

commit 511a9db
Author: Vitalii Yevenko <vitalii.yevenko@weka.io>
Date:   Fri Jan 30 12:23:14 2026 +0200

    disabled redis for LWH

commit 249a960
Author: Vitalii Yevenko <vitalii.yevenko@weka.io>
Date:   Thu Jan 29 22:00:15 2026 +0200

    fixed redis deployment

commit a335aa3
Merge: b3e913b 53deac1
Author: vyeveweka <vitalii.yevenko@weka.io>
Date:   Thu Jan 29 17:02:26 2026 +0200

    Merge pull request #111 from weka/chore/v.yevenko/WH-3694-disable-redis

    chore: disable redis

commit 53deac1
Author: Vitalii Yevenko <vitalii.yevenko@weka.io>
Date:   Thu Jan 29 14:15:40 2026 +0200

    disable redis
@danielBWeka danielBWeka merged commit 8c1b123 into release/v0.4 Feb 8, 2026
3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants