Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6457-mxpq-4fqq | i18nextify has DOM XSS via javascript:/data: URL schemes in translated href/src attributes |
Mon, 11 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 May 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
I18next
I18next i18next |
|
| Vendors & Products |
I18next
I18next i18next |
Thu, 07 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | i18nextify is a JavaScript library that adds website internationalization via a script tag, without source code changes. Versions prior to 4.0.8 substitute {{key}} interpolation tokens inside src and href attribute values with the raw string returned by i18next.t(). The substitution logic in src/localize.js (the replaceInside handler) only guards against a duplicated http:// origin prefix — it does not validate the URL scheme of the substituted value. A translated value such as javascript:alert(1) or data:text/html,<script>...</script> is applied unchanged to the live DOM attribute when an attacker can influence the content of a translation file or the translation-backend response — for example, via a compromised translation CDN, user-contributed locales, a MITM on a plain-HTTP backend, or write access to the translation JSON. This issue was patched in version 4.0.8. | |
| Title | i18nextify is vulnerable to DOM XSS via javascript:/data: URL schemes in translated href/src attributes | |
| Weaknesses | CWE-79 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-11T18:04:43.650Z
Reserved: 2026-04-22T03:53:24.407Z
Link: CVE-2026-41692
Updated: 2026-05-11T18:03:45.806Z
Status : Awaiting Analysis
Published: 2026-05-07T21:16:29.717
Modified: 2026-05-08T16:05:43.103
Link: CVE-2026-41692
No data.
OpenCVE Enrichment
Updated: 2026-05-11T16:11:54Z
Github GHSA