Back to list

i18next-locize-backend has URL Injection via Unsanitized Path Parameters — CVE-2026-41885

GitHub · GitHub · CVE-2026-41885

ID
CVE-2026-41885
Date
Updated
Activity
Source
GitHub
Vendor
GitHub
Threat
medium
CVSS
6.5
EPSS
0.0005

Summary

### Summary Versions of `i18next-locize-backend` prior to 9.0.2 interpolate `lng`, `ns`, `projectId`, and `version` directly into the configured `loadPath` / `privatePath` / `addPath` / `updatePath` / `getLanguagesPath` URL templates with no path-component validation and no encoding. When an application exposes any of these values to user-controlled input (`?lng=` / `?ns=` query parameters via…

Product

npm: i18next-locize-backend

What to do

General, cautious steps (verify details in the official source):

  • Review exposure and plan remediation based on risk and environment.
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories