Sonatype GuideSonatype Guide
ComponentsVulnerabilitiesPricingMCPAPI
Docs
Sign up
Login
npm
@salesforce/code-analyzer-pmd-engine
0.16.0-SNAPSHOT

@salesforce/code-analyzer-pmd-engine 0.16.0-SNAPSHOT

PublishedDec 13, 2024•Policy
compliance
npm Registry
Developer Trust Score
N/A
Recommended Version:x.y.z
Latest version with 0 known vulnerabilities that meets your policy.
Compare Versions
Severity
CVSS Score
0.010.0
EPSS Score
0.01.0
Malware
6.1CVE-2026-28338
PMD is an extensible multilanguage static code analyzer. Prior to version 7.22.0, PMD's `vbhtml` and `yahtml` report formats insert rule violation messages into HTML output without escaping. When PMD analyzes untrusted source code containing crafted string literals, the generated HTML report contains executable JavaScript that runs when opened in a browser. Practical impact is limited because `vbhtml` and `yahtml` are legacy formats rarely used in practice. The default `html` format is properly escaped and not affected. Version 7.22.0 contains a fix for the issue.
affected
SeverityMedium
PublishedFeb 28, 2026
6.9CVE-2025-48924
Uncontrolled Recursion vulnerability in Apache Commons Lang. This issue affects Apache Commons Lang: Starting with commons-lang:commons-lang 2.0 to 2.6, and, from org.apache.commons:commons-lang3 3.0 before 3.18.0. The methods ClassUtils.getClass(...) can throw StackOverflowError on very long inputs. Because an Error is usually not handled by applications and libraries, a StackOverflowError could cause an application to stop. Users are recommended to upgrade to version 3.18.0, which fixes the issue.
affected
SeverityMedium
6.9sonatype-2025-000535
github.com/sigstore/sigstore-java (gson) - Stack-based Buffer Overflow [CVE-2025-53864]
affected
SeverityMedium
5.3CVE-2025-23215
PMD is an extensible multilanguage static code analyzer. The passphrase for the PMD and PMD Designer release signing keys are included in jar published to Maven Central. The private key itself is not known to have been compromised itself, but given its passphrase is, it must also be considered potentially compromised. As a mitigation, both compromised keys have been revoked so that no future use of the keys are possible. Note, that the published artifacts in Maven Central under the group id net.sourceforge.pmd are not compromised and the signatures are valid.
affected
SeverityMedium
PublishedFeb 3, 2025
PublishedJul 14, 2025
Published
Feb 13, 2025