Update npm package storybook to v9.1.19 [SECURITY]#8488
Update npm package storybook to v9.1.19 [SECURITY]#8488hash-worker[bot] wants to merge 1 commit intomainfrom
storybook to v9.1.19 [SECURITY]#8488Conversation
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
PR SummaryLow Risk Overview This pulls in Storybook’s Written by Cursor Bugbot for commit dc79b4c. This will update automatically on new commits. Configure here. |
🤖 Augment PR SummarySummary: Updates the Storybook dependency across internal packages to pick up the patched v9.1.19 release. Changes:
Technical Notes: This upgrade addresses the dev-server WebSocket origin validation vulnerability noted in GHSA-mjf5-7g4m-gx5w. 🤖 Was this summary useful? React with 👍 or 👎 |
This PR contains the following updates:
9.1.17->9.1.19Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
GitHub Vulnerability Alerts
CVE-2026-27148
Summary
The WebSocket functionality in Storybook's dev server, used to create and update stories, is vulnerable to WebSocket hijacking. This vulnerability only affects the Storybook dev server; production builds are not impacted.
Details
Exploitation requires a developer to visit a malicious website while their local Storybook dev server is running. Because the WebSocket connection does not validate the origin of incoming connections, a malicious site can silently send WebSocket messages to the local instance without any further user interaction.
If a Storybook dev server is intentionally exposed publicly (e.g. for design reviews or stakeholder demos) the risk is higher, as no malicious site visit is required. Any unauthenticated attacker can send WebSocket messages to it directly.
The vulnerability affects the WebSocket message handlers for creating and saving stories, which can be exploited via unauthorized WebSocket connections to achieve persistent XSS or Remote Code Execution (RCE).
Note: recent versions of Chrome have some protections against this, but Firefox does not.
Impact
This vulnerability can lead to supply chain compromise. Key risks include:
Affected versions
8.1 and above. While the exploitable functionality was introduced in 8.1, the patch has been applied to 7.x as a precautionary measure given the underlying WebSocket behaviour.
Recommended actions
Update to one of the patched versions:
7.6.23,8.6.17,9.1.19,10.2.10.Release Notes
storybookjs/storybook (storybook)
v9.1.19Compare Source
9.1.19
v9.1.18Compare Source
9.1.18
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.