xasharma please copy-paste the command you used and the output here.
At any time, you can run composer audit
in your Flarum installation folder. It will show all the vulnerabilities known to Packagist.
You can try updating the listed packages with composer update <package>
, eventually using the -W
flag to update dependencies of that dependency as needed, or composer update
without any argument to update everything. Keep in mind this might also update extensions or even Flarum itself if you are not up to date, so it's a good idea to have a backup ready.
It's possible that some vulnerabilities are only fixed in newer versions of a specific dependency and the extension author will need to update their extension to request the newer dependency instead of the old one.
While it's a good practice to update everything as soon as possible, not all vulnerabilities listed by the audit
command are necessarily of concern when using Flarum. Some vulnerabilities are in optional components of the libraries that Flarum or extensions might not use at all. Or the impacted code might be used but not in a way that allows exploiting the vulnerability.
For instance CVE-2023-29197 "Improper header validation" in guzzlehttp/psr7
should not be of concern if Guzzle is required by one of the OAuth extensions or my WordPress extension, because they only perform requests to trusted hosts with the Guzzle Library. But other extensions could use Guzzle to perform requests to user-provided URLs where the vulnerability could have an impact.
If you are concerned about a particular advisory, please copy its description and the name of the extensions that caused it if you know it.