Skip to content

Update npm package storybook to v9.1.19 [SECURITY]#8488

Open
hash-worker[bot] wants to merge 1 commit intomainfrom
deps/js/npm-storybook-vulnerability
Open

Update npm package storybook to v9.1.19 [SECURITY]#8488
hash-worker[bot] wants to merge 1 commit intomainfrom
deps/js/npm-storybook-vulnerability

Conversation

@hash-worker
Copy link
Contributor

@hash-worker hash-worker bot commented Feb 26, 2026

This PR contains the following updates:

Package Change Age Confidence
storybook (source) 9.1.17 -> 9.1.19 age confidence

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.

GitHub Vulnerability Alerts

CVE-2026-27148

Summary

The WebSocket functionality in Storybook's dev server, used to create and update stories, is vulnerable to WebSocket hijacking. This vulnerability only affects the Storybook dev server; production builds are not impacted.

Details

Exploitation requires a developer to visit a malicious website while their local Storybook dev server is running. Because the WebSocket connection does not validate the origin of incoming connections, a malicious site can silently send WebSocket messages to the local instance without any further user interaction.

If a Storybook dev server is intentionally exposed publicly (e.g. for design reviews or stakeholder demos) the risk is higher, as no malicious site visit is required. Any unauthenticated attacker can send WebSocket messages to it directly.

The vulnerability affects the WebSocket message handlers for creating and saving stories, which can be exploited via unauthorized WebSocket connections to achieve persistent XSS or Remote Code Execution (RCE).

Note: recent versions of Chrome have some protections against this, but Firefox does not.

Impact

This vulnerability can lead to supply chain compromise. Key risks include:

  • Remote Code Execution: The vulnerability can allow attackers to execute malicious code, with the extent of impact depending on the configuration. Server-side RCE is possible in non-default configurations, such as when stories are executed via portable stories in JSDOM, potentially allowing attackers to exfiltrate credentials and environment variables, access source code and the filesystem, establish backdoors, or pivot to internal network resources.
  • Persistent XSS: Malicious payloads are written directly into story source files. If the malicious payload is committed to version control, it becomes part of the codebase and can propagate to deployed Storybook documentation sites, affecting developers and stakeholders who view them.
  • Supply Chain Propagation: If the modified source files are committed, injected code can spread to other team members via git, execute in CI/CD pipelines, and affect shared component libraries used across multiple projects.

Affected versions

8.1 and above. While the exploitable functionality was introduced in 8.1, the patch has been applied to 7.x as a precautionary measure given the underlying WebSocket behaviour.

Recommended actions

Update to one of the patched versions: 7.6.23, 8.6.17, 9.1.19, 10.2.10.


Release Notes

storybookjs/storybook (storybook)

v9.1.19

Compare Source

9.1.19
  • Harden websocket connection

v9.1.18

Compare Source

9.1.18
  • No-op release. No changes.

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@hash-worker hash-worker bot enabled auto-merge February 26, 2026 16:54
@vercel
Copy link

vercel bot commented Feb 26, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
hash Building Building Preview, Comment Feb 26, 2026 4:54pm
hashdotdesign Building Building Preview, Comment Feb 26, 2026 4:54pm
hashdotdesign-tokens Building Building Preview, Comment Feb 26, 2026 4:54pm
petrinaut Building Building Preview, Comment Feb 26, 2026 4:54pm

@cursor
Copy link

cursor bot commented Feb 26, 2026

PR Summary

Low Risk
Low risk dependency bump limited to Storybook dev tooling; main potential impact is minor dev-server/build compatibility changes.

Overview
Updates the storybook dev dependency from 9.1.17 to 9.1.19 across the design system/component editor packages, and refreshes yarn.lock accordingly.

This pulls in Storybook’s 9.1.19 patch release (including the websocket hardening security fix) without changing application/runtime code.

Written by Cursor Bugbot for commit dc79b4c. This will update automatically on new commits. Configure here.

@github-actions github-actions bot added area/deps Relates to third-party dependencies (area) area/libs Relates to first-party libraries/crates/packages (area) type/eng > frontend Owned by the @frontend team area/apps > hash.design Affects the `hash.design` design site (app) labels Feb 26, 2026
@augmentcode
Copy link

augmentcode bot commented Feb 26, 2026

🤖 Augment PR Summary

Summary: Updates the Storybook dependency across internal packages to pick up the patched v9.1.19 release.

Changes:

  • Bumped storybook from 9.1.17 to 9.1.19 in @hashintel/ds-components, @hashintel/query-editor, and @hashintel/type-editor.
  • Refreshes the lockfile accordingly (not reviewed here).

Technical Notes: This upgrade addresses the dev-server WebSocket origin validation vulnerability noted in GHSA-mjf5-7g4m-gx5w.

🤖 Was this summary useful? React with 👍 or 👎

Copy link

@augmentcode augmentcode bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Review completed. No suggestions at this time.

Comment augment review to trigger a new review at any time.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

area/apps > hash.design Affects the `hash.design` design site (app) area/deps Relates to third-party dependencies (area) area/libs Relates to first-party libraries/crates/packages (area) type/eng > frontend Owned by the @frontend team

Development

Successfully merging this pull request may close these issues.

0 participants