Debian Package Tracker
Register | Log in
Subscribe

node-webpack

Packs CommonJs/AMD modules for the browser

Choose email to subscribe with

general
  • source: node-webpack (main)
  • version: 5.97.1+dfsg1+~cs11.18.27-3
  • maintainer: Debian Javascript Maintainers (archive) (DMD)
  • uploaders: Pirate Praveen [DMD]
  • arch: all
  • std-ver: 4.7.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 4.43.0-6+deb11u1
  • oldstable: 5.75.0+dfsg+~cs17.16.14-1+deb12u1
  • stable: 5.97.1+dfsg1+~cs11.18.27-3
  • testing: 5.97.1+dfsg1+~cs11.18.27-3
  • unstable: 5.97.1+dfsg1+~cs11.18.27-3
versioned links
  • 4.43.0-6+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.75.0+dfsg+~cs17.16.14-1+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.97.1+dfsg1+~cs11.18.27-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • webpack (1 bugs: 0, 1, 0, 0)
action needed
A new upstream version is available: 5.105.1+~cs12.18.25 high
A new upstream version 5.105.1+~cs12.18.25 is available, you should consider packaging it.
Created: 2025-11-27 Last update: 2026-02-13 11:05
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2025-68157: Webpack is a module bundler. From version 5.49.0 to before 5.104.0, when experiments.buildHttp is enabled, webpack’s HTTP(S) resolver (HttpUriPlugin) enforces allowedUris only for the initial URL, but does not re-validate allowedUris after following HTTP 30x redirects. As a result, an import that appears restricted to a trusted allow-list can be redirected to HTTP(S) URLs outside the allow-list. This is a policy/allow-list bypass that enables build-time SSRF behavior (requests from the build machine to internal-only endpoints, depending on network access) and untrusted content inclusion in build outputs (redirected content is treated as module source and bundled). This issue has been patched in version 5.104.0.
  • CVE-2025-68458: Webpack is a module bundler. From version 5.49.0 to before 5.104.1, when experiments.buildHttp is enabled, webpack’s HTTP(S) resolver (HttpUriPlugin) can be bypassed to fetch resources from hosts outside allowedUris by using crafted URLs that include userinfo (username:password@host). If allowedUris enforcement relies on a raw string prefix check (e.g., uri.startsWith(allowed)), a URL that looks allow-listed can pass validation while the actual network request is sent to a different authority/host after URL parsing. This is a policy/allow-list bypass that enables build-time SSRF behavior (outbound requests from the build machine to internal-only endpoints, depending on network access) and untrusted content inclusion (the fetched response is treated as module source and bundled). This issue has been patched in version 5.104.1.
Created: 2026-02-06 Last update: 2026-02-09 15:30
2 security issues in forky high

There are 2 open security issues in forky.

2 important issues:
  • CVE-2025-68157: Webpack is a module bundler. From version 5.49.0 to before 5.104.0, when experiments.buildHttp is enabled, webpack’s HTTP(S) resolver (HttpUriPlugin) enforces allowedUris only for the initial URL, but does not re-validate allowedUris after following HTTP 30x redirects. As a result, an import that appears restricted to a trusted allow-list can be redirected to HTTP(S) URLs outside the allow-list. This is a policy/allow-list bypass that enables build-time SSRF behavior (requests from the build machine to internal-only endpoints, depending on network access) and untrusted content inclusion in build outputs (redirected content is treated as module source and bundled). This issue has been patched in version 5.104.0.
  • CVE-2025-68458: Webpack is a module bundler. From version 5.49.0 to before 5.104.1, when experiments.buildHttp is enabled, webpack’s HTTP(S) resolver (HttpUriPlugin) can be bypassed to fetch resources from hosts outside allowedUris by using crafted URLs that include userinfo (username:password@host). If allowedUris enforcement relies on a raw string prefix check (e.g., uri.startsWith(allowed)), a URL that looks allow-listed can pass validation while the actual network request is sent to a different authority/host after URL parsing. This is a policy/allow-list bypass that enables build-time SSRF behavior (outbound requests from the build machine to internal-only endpoints, depending on network access) and untrusted content inclusion (the fetched response is treated as module source and bundled). This issue has been patched in version 5.104.1.
Created: 2026-02-06 Last update: 2026-02-09 15:30
3 security issues in bullseye high

There are 3 open security issues in bullseye.

2 important issues:
  • CVE-2025-68157: Webpack is a module bundler. From version 5.49.0 to before 5.104.0, when experiments.buildHttp is enabled, webpack’s HTTP(S) resolver (HttpUriPlugin) enforces allowedUris only for the initial URL, but does not re-validate allowedUris after following HTTP 30x redirects. As a result, an import that appears restricted to a trusted allow-list can be redirected to HTTP(S) URLs outside the allow-list. This is a policy/allow-list bypass that enables build-time SSRF behavior (requests from the build machine to internal-only endpoints, depending on network access) and untrusted content inclusion in build outputs (redirected content is treated as module source and bundled). This issue has been patched in version 5.104.0.
  • CVE-2025-68458: Webpack is a module bundler. From version 5.49.0 to before 5.104.1, when experiments.buildHttp is enabled, webpack’s HTTP(S) resolver (HttpUriPlugin) can be bypassed to fetch resources from hosts outside allowedUris by using crafted URLs that include userinfo (username:password@host). If allowedUris enforcement relies on a raw string prefix check (e.g., uri.startsWith(allowed)), a URL that looks allow-listed can pass validation while the actual network request is sent to a different authority/host after URL parsing. This is a policy/allow-list bypass that enables build-time SSRF behavior (outbound requests from the build machine to internal-only endpoints, depending on network access) and untrusted content inclusion (the fetched response is treated as module source and bundled). This issue has been patched in version 5.104.1.
1 issue postponed or untriaged:
  • CVE-2024-43788: (postponed; to be fixed through a stable update) Webpack is a module bundler. Its main purpose is to bundle JavaScript files for usage in a browser, yet it is also capable of transforming, bundling, or packaging just about any resource or asset. The webpack developers have discovered a DOM Clobbering vulnerability in Webpack’s `AutoPublicPathRuntimeModule`. The DOM Clobbering gadget in the module can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an `img` tag with an unsanitized `name` attribute) are present. Real-world exploitation of this gadget has been observed in the Canvas LMS which allows a XSS attack to happen through a javascript code compiled by Webpack (the vulnerable part is from Webpack). DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script, seemingly benign HTML markups in the webpage (e.g. through a post or comment) and leverages the gadgets (pieces of js code) living in the existing javascript code to transform it into executable code. This vulnerability can lead to cross-site scripting (XSS) on websites that include Webpack-generated files and allow users to inject certain scriptless HTML tags with improperly sanitized name or id attributes. This issue has been addressed in release version 5.94.0. All users are advised to upgrade. There are no known workarounds for this issue.
Created: 2026-02-06 Last update: 2026-02-09 15:30
lintian reports 8 warnings normal
Lintian reports 8 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2024-12-19 Last update: 2025-05-24 03:31
2 low-priority security issues in trixie low

There are 2 open security issues in trixie.

2 issues left for the package maintainer to handle:
  • CVE-2025-68157: (needs triaging) Webpack is a module bundler. From version 5.49.0 to before 5.104.0, when experiments.buildHttp is enabled, webpack’s HTTP(S) resolver (HttpUriPlugin) enforces allowedUris only for the initial URL, but does not re-validate allowedUris after following HTTP 30x redirects. As a result, an import that appears restricted to a trusted allow-list can be redirected to HTTP(S) URLs outside the allow-list. This is a policy/allow-list bypass that enables build-time SSRF behavior (requests from the build machine to internal-only endpoints, depending on network access) and untrusted content inclusion in build outputs (redirected content is treated as module source and bundled). This issue has been patched in version 5.104.0.
  • CVE-2025-68458: (needs triaging) Webpack is a module bundler. From version 5.49.0 to before 5.104.1, when experiments.buildHttp is enabled, webpack’s HTTP(S) resolver (HttpUriPlugin) can be bypassed to fetch resources from hosts outside allowedUris by using crafted URLs that include userinfo (username:password@host). If allowedUris enforcement relies on a raw string prefix check (e.g., uri.startsWith(allowed)), a URL that looks allow-listed can pass validation while the actual network request is sent to a different authority/host after URL parsing. This is a policy/allow-list bypass that enables build-time SSRF behavior (outbound requests from the build machine to internal-only endpoints, depending on network access) and untrusted content inclusion (the fetched response is treated as module source and bundled). This issue has been patched in version 5.104.1.

You can find information about how to handle these issues in the security team's documentation.

Created: 2026-02-06 Last update: 2026-02-09 15:30
3 low-priority security issues in bookworm low

There are 3 open security issues in bookworm.

3 issues left for the package maintainer to handle:
  • CVE-2024-43788: (needs triaging) Webpack is a module bundler. Its main purpose is to bundle JavaScript files for usage in a browser, yet it is also capable of transforming, bundling, or packaging just about any resource or asset. The webpack developers have discovered a DOM Clobbering vulnerability in Webpack’s `AutoPublicPathRuntimeModule`. The DOM Clobbering gadget in the module can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an `img` tag with an unsanitized `name` attribute) are present. Real-world exploitation of this gadget has been observed in the Canvas LMS which allows a XSS attack to happen through a javascript code compiled by Webpack (the vulnerable part is from Webpack). DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script, seemingly benign HTML markups in the webpage (e.g. through a post or comment) and leverages the gadgets (pieces of js code) living in the existing javascript code to transform it into executable code. This vulnerability can lead to cross-site scripting (XSS) on websites that include Webpack-generated files and allow users to inject certain scriptless HTML tags with improperly sanitized name or id attributes. This issue has been addressed in release version 5.94.0. All users are advised to upgrade. There are no known workarounds for this issue.
  • CVE-2025-68157: (needs triaging) Webpack is a module bundler. From version 5.49.0 to before 5.104.0, when experiments.buildHttp is enabled, webpack’s HTTP(S) resolver (HttpUriPlugin) enforces allowedUris only for the initial URL, but does not re-validate allowedUris after following HTTP 30x redirects. As a result, an import that appears restricted to a trusted allow-list can be redirected to HTTP(S) URLs outside the allow-list. This is a policy/allow-list bypass that enables build-time SSRF behavior (requests from the build machine to internal-only endpoints, depending on network access) and untrusted content inclusion in build outputs (redirected content is treated as module source and bundled). This issue has been patched in version 5.104.0.
  • CVE-2025-68458: (needs triaging) Webpack is a module bundler. From version 5.49.0 to before 5.104.1, when experiments.buildHttp is enabled, webpack’s HTTP(S) resolver (HttpUriPlugin) can be bypassed to fetch resources from hosts outside allowedUris by using crafted URLs that include userinfo (username:password@host). If allowedUris enforcement relies on a raw string prefix check (e.g., uri.startsWith(allowed)), a URL that looks allow-listed can pass validation while the actual network request is sent to a different authority/host after URL parsing. This is a policy/allow-list bypass that enables build-time SSRF behavior (outbound requests from the build machine to internal-only endpoints, depending on network access) and untrusted content inclusion (the fetched response is treated as module source and bundled). This issue has been patched in version 5.104.1.

You can find information about how to handle these issues in the security team's documentation.

Created: 2024-08-28 Last update: 2026-02-09 15:30
debian/patches: 2 patches to forward upstream low

Among the 8 debian patches available in version 5.97.1+dfsg1+~cs11.18.27-3 of the package, we noticed the following issues:

  • 2 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-05-24 07:27
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 4.7.0).
Created: 2025-02-21 Last update: 2025-12-23 20:00
news
[rss feed]
  • [2025-06-13] node-webpack 5.97.1+dfsg1+~cs11.18.27-3 MIGRATED to testing (Debian testing watch)
  • [2025-05-23] Accepted node-webpack 5.97.1+dfsg1+~cs11.18.27-3 (source) into unstable (Jérémy Lal)
  • [2025-03-24] node-webpack 5.97.1+dfsg1+~cs11.18.27-2 MIGRATED to testing (Debian testing watch)
  • [2025-03-21] Accepted node-webpack 5.97.1+dfsg1+~cs11.18.27-2 (source) into unstable (Jérémy Lal)
  • [2024-12-24] node-webpack 5.97.1+dfsg1+~cs11.18.27-1 MIGRATED to testing (Debian testing watch)
  • [2024-12-18] Accepted node-webpack 5.97.1+dfsg1+~cs11.18.27-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2024-11-08] node-webpack 5.96.1+dfsg1+~cs11.18.26-1 MIGRATED to testing (Debian testing watch)
  • [2024-11-03] Accepted node-webpack 5.96.1+dfsg1+~cs11.18.26-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2024-11-02] node-webpack 5.95.0+dfsg1+~cs11.18.26-1 MIGRATED to testing (Debian testing watch)
  • [2024-10-28] Accepted node-webpack 5.95.0+dfsg1+~cs11.18.26-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2024-09-21] node-webpack 5.94.0+dfsg1+~cs11.18.26-2 MIGRATED to testing (Debian testing watch)
  • [2024-09-16] Accepted node-webpack 5.94.0+dfsg1+~cs11.18.26-2 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2024-08-28] Accepted node-webpack 5.94.0+dfsg1+~cs11.18.26-1 (source) into experimental (Yadd) (signed by: Xavier Guimard)
  • [2024-02-18] node-webpack 5.76.1+dfsg2+~cs10.8.15-3 MIGRATED to testing (Debian testing watch)
  • [2024-02-12] Accepted node-webpack 5.76.1+dfsg2+~cs10.8.15-3 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2024-01-06] Accepted node-webpack 5.76.1+dfsg2+~cs10.8.15-2 (source) into experimental (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2023-07-12] Accepted node-webpack 5.75.0+dfsg+~cs17.16.14-1+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Xavier Guimard)
  • [2023-06-13] node-webpack 5.76.1+dfsg1+~cs17.16.16-1 MIGRATED to testing (Debian testing watch)
  • [2023-04-07] Accepted node-webpack 4.43.0-6+deb11u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Xavier Guimard)
  • [2023-03-14] Accepted node-webpack 5.76.1+dfsg1+~cs17.16.16-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-11-24] node-webpack 5.75.0+dfsg+~cs17.16.14-1 MIGRATED to testing (Debian testing watch)
  • [2022-11-19] node-webpack 5.74.0+repack1+~cs9.13.6-1 MIGRATED to testing (Debian testing watch)
  • [2022-11-18] Accepted node-webpack 5.75.0+dfsg+~cs17.16.14-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-11-18] Accepted node-webpack 5.75.0+dfsg+~cs10.3.6-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-11-14] Accepted node-webpack 5.74.0+repack1+~cs9.13.6-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-10-10] node-webpack 5.74.0+dfsg+~cs10.13.6-4 MIGRATED to testing (Debian testing watch)
  • [2022-09-30] Accepted node-webpack 5.74.0+dfsg+~cs10.13.6-4 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-09-29] Accepted node-webpack 5.74.0+dfsg+~cs10.13.6-3 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-08-17] node-webpack 5.74.0+dfsg+~cs10.13.6-2 MIGRATED to testing (Debian testing watch)
  • [2022-08-11] Accepted node-webpack 5.74.0+dfsg+~cs10.13.6-2 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • 1
  • 2
bugs [bug history graph]
  • all: 2
  • RC: 0
  • I&N: 2
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 8)
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 5.97.1+dfsg1+~cs11.18.27-3
  • 1 bug

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing