Bump axios and @serverless/platform-client#23
Conversation
Bumps [axios](https://github.com/axios/axios) and @serverless/platform-client. These dependencies needed to be updated together. Updates `axios` from 0.21.4 to 1.15.0 - [Release notes](https://github.com/axios/axios/releases) - [Changelog](https://github.com/axios/axios/blob/v1.x/CHANGELOG.md) - [Commits](axios/axios@v0.21.4...v1.15.0) Updates `@serverless/platform-client` from 4.3.2 to 4.5.1 --- updated-dependencies: - dependency-name: axios dependency-version: 1.15.0 dependency-type: indirect - dependency-name: "@serverless/platform-client" dependency-version: 4.5.1 dependency-type: indirect ... Signed-off-by: dependabot[bot] <support@github.com>
Wiz Scan Summary
To detect these findings earlier in the dev lifecycle, try using Wiz Code VS Code Extension. |
There was a problem hiding this comment.
More Details
Vulnerabilities [braces:3.0.2]
| Name | Severity | Source | Fixed version | CVSS score | CVSS exploitability score | Has public exploit | Has CISA KEV exploit |
|---|---|---|---|---|---|---|---|
| CVE-2024-4068 | GHSA-grv7-fg5c-xmjg | 3.0.3 | 7.5 | 3.9 | true | false |
To ignore this finding as an exception, reply to this conversation with #wiz_ignore reason
If you'd like to ignore this finding in all future scans, add an exception in the .wiz file (learn more) or create an Ignore Rule (learn more).
To get more details on how to remediate this issue using AI, reply to this conversation with #wiz remediate
There was a problem hiding this comment.
More Details
Vulnerabilities [semver:7.3.7]
| Name | Severity | Source | Fixed version | CVSS score | CVSS exploitability score | Has public exploit | Has CISA KEV exploit |
|---|---|---|---|---|---|---|---|
| CVE-2022-25883 | GHSA-c2qf-rxjj-qqgw | 7.5.2 | 7.5 | 3.9 | false | false |
To ignore this finding as an exception, reply to this conversation with #wiz_ignore reason
If you'd like to ignore this finding in all future scans, add an exception in the .wiz file (learn more) or create an Ignore Rule (learn more).
To get more details on how to remediate this issue using AI, reply to this conversation with #wiz remediate
There was a problem hiding this comment.
More Details
Vulnerabilities [tar:4.4.19]
| Name | Severity | Source | Fixed version | CVSS score | CVSS exploitability score | Has public exploit | Has CISA KEV exploit |
|---|---|---|---|---|---|---|---|
| CVE-2024-28863 | GHSA-f5x3-32g6-xq36 | 6.2.1 | 6.5 | 2.8 | true | false | |
| CVE-2026-23745 | GHSA-8qq5-rm4j-mr97 | 7.5.3 | 8.2 | 1.8 | true | false | |
| CVE-2026-23950 | GHSA-r6q2-hw4h-h46w | 7.5.4 | 5.9 | 2.2 | true | false | |
| CVE-2026-24842 | GHSA-34x7-hfp2-rc4v | 7.5.7 | 8.2 | 2.8 | true | false | |
| CVE-2026-26960 | GHSA-83g3-92jg-28cx | 7.5.8 | 7.1 | 1.8 | true | false | |
| CVE-2026-29786 | GHSA-qffp-2rhf-9h96 | 7.5.10 | 8.2 | 1.8 | true | false | |
| CVE-2026-31802 | GHSA-9ppj-qmqm-q256 | 7.5.11 | 8.2 | 1.8 | true | false |
To ignore this finding as an exception, reply to this conversation with #wiz_ignore reason
If you'd like to ignore this finding in all future scans, add an exception in the .wiz file (learn more) or create an Ignore Rule (learn more).
To get more details on how to remediate this issue using AI, reply to this conversation with #wiz remediate
There was a problem hiding this comment.
More Details
Vulnerabilities [tar:6.1.11]
| Name | Severity | Source | Fixed version | CVSS score | CVSS exploitability score | Has public exploit | Has CISA KEV exploit |
|---|---|---|---|---|---|---|---|
| CVE-2024-28863 | GHSA-f5x3-32g6-xq36 | 6.2.1 | 6.5 | 2.8 | true | false | |
| CVE-2026-23745 | GHSA-8qq5-rm4j-mr97 | 7.5.3 | 8.2 | 1.8 | true | false | |
| CVE-2026-23950 | GHSA-r6q2-hw4h-h46w | 7.5.4 | 5.9 | 2.2 | true | false | |
| CVE-2026-24842 | GHSA-34x7-hfp2-rc4v | 7.5.7 | 8.2 | 2.8 | true | false | |
| CVE-2026-26960 | GHSA-83g3-92jg-28cx | 7.5.8 | 7.1 | 1.8 | true | false | |
| CVE-2026-29786 | GHSA-qffp-2rhf-9h96 | 7.5.10 | 8.2 | 1.8 | true | false | |
| CVE-2026-31802 | GHSA-9ppj-qmqm-q256 | 7.5.11 | 8.2 | 1.8 | true | false |
To ignore this finding as an exception, reply to this conversation with #wiz_ignore reason
If you'd like to ignore this finding in all future scans, add an exception in the .wiz file (learn more) or create an Ignore Rule (learn more).
To get more details on how to remediate this issue using AI, reply to this conversation with #wiz remediate
There was a problem hiding this comment.
More Details
Vulnerabilities [picomatch:2.3.1]
| Name | Severity | Source | Fixed version | CVSS score | CVSS exploitability score | Has public exploit | Has CISA KEV exploit |
|---|---|---|---|---|---|---|---|
| CVE-2026-33671 | GHSA-c2c7-rcm5-vvqj | 2.3.2 | 7.5 | 3.9 | false | false | |
| CVE-2026-33672 | GHSA-3v7f-55p6-f55p | 2.3.2 | 5.3 | 3.9 | false | false |
To ignore this finding as an exception, reply to this conversation with #wiz_ignore reason
If you'd like to ignore this finding in all future scans, add an exception in the .wiz file (learn more) or create an Ignore Rule (learn more).
To get more details on how to remediate this issue using AI, reply to this conversation with #wiz remediate
There was a problem hiding this comment.
More Details
Vulnerabilities [minimatch:3.1.2]
| Name | Severity | Source | Fixed version | CVSS score | CVSS exploitability score | Has public exploit | Has CISA KEV exploit |
|---|---|---|---|---|---|---|---|
| CVE-2026-26996 | GHSA-3ppc-4f35-3m26 | 3.1.3 | 8.7 | 3.9 | true | false | |
| CVE-2026-27903 | GHSA-7r86-cg39-jmmj | 3.1.3 | 7.5 | 3.9 | true | false | |
| CVE-2026-27904 | GHSA-23c5-xmqv-rm74 | 3.1.4 | 7.5 | 3.9 | true | false |
To ignore this finding as an exception, reply to this conversation with #wiz_ignore reason
If you'd like to ignore this finding in all future scans, add an exception in the .wiz file (learn more) or create an Ignore Rule (learn more).
To get more details on how to remediate this issue using AI, reply to this conversation with #wiz remediate
Bumps axios and @serverless/platform-client. These dependencies needed to be updated together.
Updates
axiosfrom 0.21.4 to 1.15.0Release notes
Sourced from axios's releases.
... (truncated)
Changelog
Sourced from axios's changelog.
... (truncated)
Commits
772a4e5chore(release): prepare release 1.15.0 (#10671)4b07137chore(deps-dev): bump vite from 8.0.0 to 8.0.5 in /tests/smoke/esm (#10663)51e57b3chore(deps-dev): bump vite from 8.0.2 to 8.0.5 (#10664)fba1a77chore(deps-dev): bump vite from 8.0.2 to 8.0.5 in /tests/module/esm (#10665)0bf6e28chore(deps): bump denoland/setup-deno in the github-actions group (#10669)8107157chore(deps-dev): bump the development_dependencies group with 4 updates (#10670)e66530eci: require npm-publish environment for releases (#10666)49f23cbchore(sponsor): update sponsor block (#10668)3631854fix: unrestricted cloud metadata exfiltration via header injection chain (#10...fb3befbfix: no_proxy hostname normalization bypass leads to ssrf (#10661)Maintainer changes
This version was pushed to npm by [GitHub Actions](https://www.npmjs.com/~GitHub Actions), a new releaser for axios since your current version.
Install script changes
This version adds
preparescript that runs during installation. Review the package contents before updating.Updates
@serverless/platform-clientfrom 4.3.2 to 4.5.1Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)You can disable automated security fix PRs for this repo from the Security Alerts page.