98
Affected versions of the package are vulnerable to remote code execution. It is possible to inject a server-side script into the "src" of a <script> tag. As happy-dom uses child_process.execFileSync() in order to perform the fetch synchronous, the script could be injected by escaping from the URL string. e.g. document.write(`<script src="https://localhost:8080/'+require('child_process').execSync('id')+'"></script>`);
You're affected if you are using a version which is within vulnerability ranges.
Upgrade happy-dom library to patch version.