mirror of
https://github.com/mountain-loop/yaak.git
synced 2026-01-11 20:00:29 +01:00
[PR #308] [CLOSED] [Security] Fix CRITICAL vulnerability: V-002 #228
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/mountain-loop/yaak/pull/308
Author: @orbisai0security
Created: 11/26/2025
Status: ❌ Closed
Base:
main← Head:fix/v-002-plugin-sandbox-security📝 Commits (1)
12df361fix: resolve critical vulnerability V-002📊 Changes
1 file changed (+26 additions, -4 deletions)
View changed files
📝
plugins/importer-insomnia/src/index.ts(+26 -4)📄 Description
Security Fix
This PR addresses a CRITICAL severity vulnerability detected by our security scanner.
Security Impact Assessment
Evidence: Proof-of-Concept Exploitation Demo
⚠️ For Educational/Security Awareness Only
This demonstration shows how the vulnerability could be exploited to help you understand its severity and prioritize remediation.
How This Vulnerability Can Be Exploited
The vulnerability allows plugins in Yaak to execute arbitrary Node.js code with full system privileges, as they are not sandboxed or restricted. An attacker could create a malicious plugin that mimics legitimate functionality (e.g., an Insomnia importer) but includes code to perform unauthorized actions like reading sensitive files or executing shell commands when the plugin is loaded or triggered during an import operation. This exploits the unrestricted access to Node.js modules such as
fsandchild_process, enabling real-world attacks like credential theft or system compromise on the user's machine where Yaak runs.The vulnerability allows plugins in Yaak to execute arbitrary Node.js code with full system privileges, as they are not sandboxed or restricted. An attacker could create a malicious plugin that mimics legitimate functionality (e.g., an Insomnia importer) but includes code to perform unauthorized actions like reading sensitive files or executing shell commands when the plugin is loaded or triggered during an import operation. This exploits the unrestricted access to Node.js modules such as
fsandchild_process, enabling real-world attacks like credential theft or system compromise on the user's machine where Yaak runs.Exploitation Impact Assessment
Vulnerability Details
V-002plugins/importer-insomnia/src/index.tsChanges Made
This automated fix addresses the vulnerability by applying security best practices.
Files Modified
plugins/importer-insomnia/src/index.tsVerification
This fix has been automatically verified through:
🤖 This PR was automatically generated.
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.