logo

CVE-2025-31476 tarteaucitronjs

Package

Manager: npm
Name: tarteaucitronjs
Vulnerable Version: >=0 <1.20.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00022 pctl0.04272

Details

tarteaucitron.js allows url scheme injection via unfiltered inputs A vulnerability was identified in `tarteaucitron.js`, allowing a user with high privileges (access to the site's source code or a CMS plugin) to enter a URL containing an insecure scheme such as `javascript:alert()`. Before the fix, URL validation was insufficient, which could allow arbitrary JavaScript execution if a user clicked on a malicious link. ## Impact An attacker with high privileges could insert a link exploiting an insecure URL scheme, leading to: - Execution of arbitrary JavaScript code - Theft of sensitive data through phishing attacks - Modification of the user interface behavior ## Fix https://github.com/AmauriC/tarteaucitron.js/commit/2fa1e01023bce2e4b813200600bb1619d56ceb02 The issue was resolved by enforcing strict URL validation, ensuring that they start with `http://` or `https://` before being used.

Metadata

Created: 2025-04-07T16:46:57Z
Modified: 2025-04-07T16:46:57Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-p5g4-v748-6fh8/GHSA-p5g4-v748-6fh8.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-p5g4-v748-6fh8
Finding: F008
Auto approve: 1