CVE-2025-31476

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-31476
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-31476.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-31476
Aliases
Published
2025-04-07T14:52:12.728Z
Modified
2025-12-02T23:13:31.899667Z
Severity
  • 4.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
tarteaucitron.js allows url scheme injection via unfiltered inputs
Details

tarteaucitron.js is a compliant and accessible cookie banner. A vulnerability was identified in tarteaucitron.js, allowing a user with high privileges (access to the site's source code or a CMS plugin) to enter a URL containing an insecure scheme such as javascript:alert(). Before the fix, URL validation was insufficient, which could allow arbitrary JavaScript execution if a user clicked on a malicious link. An attacker with high privileges could insert a link exploiting an insecure URL scheme, leading to execution of arbitrary JavaScript code, theft of sensitive data through phishing attacks, or modification of the user interface behavior. This vulnerability is fixed in 1.20.1.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/31xxx/CVE-2025-31476.json",
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/amauric/tarteaucitron.js

Affected ranges

Type
GIT
Repo
https://github.com/amauric/tarteaucitron.js
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

20200910
20210305
20210306
20210329

V1.*

V1.2

v0.*

v0.1

v1.*

v1.0
v1.1
v1.10.0
v1.11.0
v1.12.0
v1.13.0
v1.13.1
v1.14.0
v1.15.0
v1.16.0
v1.16.1
v1.17.0
v1.18.0
v1.18.1
v1.19.0
v1.2
v1.2.0
v1.20.0
v1.3
v1.4
v1.5
v1.6
v1.8
v1.8.1
v1.8.2
v1.8.3
v1.8.4
v1.9.1
v1.9.3
v1.9.4
v1.9.5
v1.9.6
v1.9.7
v1.9.8
v1.9.9