๐Ÿ” CVE Alert

CVE-2026-39315

MEDIUM 6.1

Unhead has a hasDangerousProtocol() bypass via leading-zero padded HTML entities in useHeadSafe()

CVSS Score
6.1
EPSS Score
0.0%
EPSS Percentile
15th

Unhead is a document head and template manager. Prior to 2.1.13, useHeadSafe() is the composable that Nuxt's own documentation explicitly recommends for rendering user-supplied content in <head> safely. Internally, the hasDangerousProtocol() function in packages/unhead/src/plugins/safe.ts decodes HTML entities before checking for blocked URI schemes (javascript:, data:, vbscript:). The decoder uses two regular expressions with fixed-width digit caps. The HTML5 specification imposes no limit on leading zeros in numeric character references. When a padded entity exceeds the regex digit cap, the decoder silently skips it. The undecoded string is then passed to startsWith('javascript:'), which does not match. makeTagSafe() writes the raw value directly into SSR HTML output. The browser's HTML parser decodes the padded entity natively and constructs the blocked URI. This vulnerability is fixed in 2.1.13.

CWE CWE-184
Vendor unjs
Product unhead
Published Apr 9, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for unjs unhead

Be the first to know when new medium vulnerabilities affecting unjs unhead are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

unjs / unhead
< 2.1.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/unjs/unhead/security/advisories/GHSA-95h2-gj7x-gx9w github.com: https://github.com/unjs/unhead/commit/961ea781e091853812ffe17f8cda17105d2d2299 github.com: https://github.com/unjs/unhead/releases/tag/v2.1.13