Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5339-hvwr-7582 | Unhead Vulnerable to Bypass of URI Scheme Sanitization in makeTagSafe via Case-Sensitivity |
Mon, 16 Mar 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:unjs:unhead:*:*:*:*:*:*:*:* |
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Unjs
Unjs unhead |
|
| Vendors & Products |
Unjs
Unjs unhead |
Thu, 12 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Unhead is a document head and template manager. Prior to 2.1.11, The link.href check in makeTagSafe (safe.ts) uses String.includes(), which is case-sensitive. Browsers treat URI schemes case-insensitively. DATA:text/css,... is the same as data:text/css,... to the browser, but 'DATA:...'.includes('data:') returns false. An attacker can inject arbitrary CSS for UI redressing or data exfiltration via CSS attribute selectors with background-image callbacks. This vulnerability is fixed in 2.1.11. | |
| Title | Unhead has a Bypass of URI Scheme Sanitization in makeTagSafe via Case-Sensitivity | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-12T17:46:46.723Z
Reserved: 2026-03-09T19:02:25.014Z
Link: CVE-2026-31873
Updated: 2026-03-12T17:46:38.920Z
Status : Analyzed
Published: 2026-03-12T18:16:24.387
Modified: 2026-03-16T17:57:01.537
Link: CVE-2026-31873
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:48:50Z
Github GHSA