Npm vulnerability repair audit what to do after viewing the report?

Today npm hints that two high-risk vulnerabilities have been detected

run npm audit fix to repair. After the repair is completed, it is prompted that a vulnerability cannot be repaired automatically, and manual audit is required

run npm audit to get the following security report:

                       === npm audit security report ===


                                 Manual Review
             Some vulnerabilities require your attention to resolve

          Visit https://go.npm.me/audit-guide for additional guidance


  High            Missing Origin Validation

  Package         webpack-dev-server

  Patched in      >=3.1.11

  Dependency of   vue-photo-preview

  Path            vue-photo-preview > webpack-dev-server

  More info       https://nodesecurity.io/advisories/725

found 1 high severity vulnerability in 18322 scanned packages
  1 vulnerability requires manual review. See the full report for details.

is it the problem of webpack-dev-server or vue-photo-preview that I don"t understand?

is there a great god who can answer how to deal with this loophole?

Jun.27,2022

clearly indicates that the version of webpack-dev-server that vue-photo-preview depends on is at risk of vulnerabilities. This was fixed after webpack-dev-server@3.1.11. But vue-photo-preview actually only depends on photoswipe, and the other 15 dependencies should be Dev Dependencies. It is recommended that you do not use vue-photo-preview as a library, just use photoswipe.


webpack-dev-server that vue-photo-preview depends on, you can try to upgrade it.

Menu