GHSA-q43x-79jr-cq98

Suggest an improvement
Source
https://github.com/advisories/GHSA-q43x-79jr-cq98
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-q43x-79jr-cq98/GHSA-q43x-79jr-cq98.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-q43x-79jr-cq98
Aliases
Published
2025-07-03T16:59:09Z
Modified
2025-07-03T18:50:09Z
Severity
  • 4.2 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:L CVSS Calculator
Summary
tarteaucitron.js vulnerable to DOM Clobbering via document.currentScript
Details

A vulnerability was identified in tarteaucitron.js where document.currentScript was accessed without verifying that it referenced an actual <script> element. If an attacker injected an HTML element such as:

<img name="currentScript" src="https://malicious.example.com">

it could clobber the document.currentScript property. This causes the script to resolve incorrectly to an <img> element instead of the <script> tag, leading to unexpected behavior or failure to load the script path correctly.

This issue arises because in some browser environments, named DOM elements (e.g., name="currentScript") become properties on the global document object.

Impact

An attacker with control over the HTML could exploit this to change the CDN domain of tarteaucitron.

Fix https://github.com/AmauriC/tarteaucitron.js/commit/230a3b69d363837acfa895823d841e0608826ba3

The issue was resolved by verifying that document.currentScript is an instance of HTMLScriptElement. If not, the script now falls back safely to the last <script> tag on the page.

Database specific
{
    "severity": "MODERATE",
    "nvd_published_at": "2025-07-03T17:15:39Z",
    "github_reviewed_at": "2025-07-03T16:59:09Z",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-138"
    ]
}
References

Affected packages

npm / tarteaucitronjs

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.22.0