Project Subscriptions
No data.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mgcp-mfp8-3q45 | i18next-locize-backend has URL Injection via Unsanitized Path Parameters |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 08 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | i18next-locize-backend is a simple i18next backend for locize.com which can be used in Node.js, in the browser and for Deno. Prior to version 9.0.2, i18next-locize-backend interpolates lng, ns, projectId, and version directly into the configured loadPath / privatePath / addPath / updatePath / getLanguagesPath URL templates with no path-component validation and no encoding. When an application exposes any of these values to user-controlled input (?lng= / ?ns= query parameters via i18next-browser-languagedetector, cookies, request headers, or a URL-derived projectId), a crafted value can change the structure of the outgoing request URL. Affected call sites in lib/index.js (pre-patch): the interpolate() helper is used at the five URL-build sites — _readAny/read (line 415 for private, 426 for public), getLanguages (lines 271 and 296), and writePage (lines 616 and 622) for the missing-key and update POST paths. The helper interpolate in lib/utils.js substitutes raw values with no encoding. This issue has been patched in version 9.0.2. | |
| Title | Path traversal / URL injection via unsanitised lng/ns/projectId/version in i18next-locize-backend | |
| Weaknesses | CWE-22 CWE-74 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T16:06:11.177Z
Reserved: 2026-04-22T15:11:54.670Z
Link: CVE-2026-41885
Updated: 2026-05-08T16:06:06.925Z
Status : Received
Published: 2026-05-08T16:16:11.913
Modified: 2026-05-08T16:16:11.913
Link: CVE-2026-41885
No data.
OpenCVE Enrichment
Updated: 2026-05-08T19:15:14Z
Github GHSA