Skip to content

Conversation

@UlisesGascon
Copy link
Member

Port for #6969

@UlisesGascon UlisesGascon marked this pull request as ready for review January 4, 2026 10:52
@UlisesGascon UlisesGascon self-assigned this Jan 5, 2026
@UlisesGascon UlisesGascon merged commit efe85d9 into 4.x Jan 5, 2026
53 checks passed
@sergio-tao
Copy link

Well done!
Is there going to be a new release (5.2.2?) with this dependency fix? 😁

@gabrieel1007
Copy link
Contributor

@sergio-tao
Good question!
Actually, everything about this is covered in PR #6969 — you can check the details there.

@serhalp
Copy link

serhalp commented Jan 8, 2026

Hello! Is there a 4.x release planned that will include this fix soon? Thanks!

@jaenster
Copy link

Could we please have a patch version for express containing this?

@jonchurch
Copy link
Member

jonchurch commented Jan 12, 2026

@serhalp @jaenster
Speaking for myself, I'm not currently planning a patch release specifically for this.

A fresh npm install already resolves to secure versions, and a patch release wouldn't change your remediation steps or silence Dependabot alerts. You'd still need to update your lockfile either way.

To update: npm update qs body-parser

(The body-parser update may not be needed depending on your version, but older versions of body-parser had qs pinned so it's good to include.)

It occurs to me though that I may be too used to managing dependencies this way to understand why others want to solve it with a patch release. Why do you ask for a patch release? Is there something causing you pain here that a patch would solve? Tooling yelling at you?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants