chore(deps): update dependency i18next-fs-backend to v2.6.5#135
Merged
renovate[bot] merged 1 commit intomainfrom Apr 27, 2026
Merged
chore(deps): update dependency i18next-fs-backend to v2.6.5#135renovate[bot] merged 1 commit intomainfrom
renovate[bot] merged 1 commit intomainfrom
Conversation
896cfb6 to
8032845
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
2.6.3→2.6.5Release Notes
i18next/i18next-fs-backend (i18next-fs-backend)
v2.6.5Compare Source
nsvalues so nested namespace names (mapping to subfolder locale files such aspublic/locales/en/a/b.json) load correctly again. 2.6.4's security fix applied the same strict path-segment check to bothlngandns, which was correct forlng(no BCP-47 shape contains/) but over-strict forns— nested namespaces containing/were never officially supported, but the behaviour fell out of the implicit string-substitution semantics ofloadPathand is common enough in the wild to be worth accommodating.isSafePathSegmentis now split intoisSafeLangSegment(strict — still rejects/) andisSafeNsSegment(loose — allows/but still rejects..,\, control chars, prototype keys, and oversized inputs).isSafePathSegmentis kept as a backwards-compatible alias for the strict check. The 2.6.4 security fix remains in force for every concrete attack pattern from the original advisory. Fixes #74.v2.6.4Compare Source
Security release — all issues found via an internal audit. See published advisory GHSA-8847-338w-5hcj.
lngornsvalues contain.., path separators (/,\), control characters, prototype keys (__proto__/constructor/prototype), or exceed 128 chars. Prevents arbitrary filesystem read / write via attacker-controlled language-code values. Any legitimate i18next language-code shape (BCP-47-like, underscores, hyphens, dots,+-joined multi-language requests) is still accepted (GHSA-8847-338w-5hcj).js/.tslocale files (their content iseval-ed, so they must be treated as code). Theevalbehaviour itself is retained: dynamic expressions in.js/.tslocale files are an intentional feature, and safe replacements likeimport()are async-only and not viable for this sync-capable code path..env*and*.pem/*.keyfiles in.gitignore.Configuration
📅 Schedule: (UTC)
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.