CVE-2026-41692
i18nextify is vulnerable to DOM XSS via javascript:/data: URL schemes in translated href/src attributes
i18nextify is a JavaScript library that adds website internationalization via a script tag, without source code changes. Versions prior to 4.0.8 substitute {{key}} interpolation tokens inside src and href attribute values with the raw string returned by i18next.t(). The substitution logic in src/localize.js (the replaceInside handler) only guards against a duplicated http:// origin prefix โ it does not validate the URL scheme of the substituted value. A translated value such as javascript:alert(1) or data:text/html,<script>...</script> is applied unchanged to the live DOM attribute when an attacker can influence the content of a translation file or the translation-backend response โ for example, via a compromised translation CDN, user-contributed locales, a MITM on a plain-HTTP backend, or write access to the translation JSON. This issue was patched in version 4.0.8.
| CWE | CWE-79 CWE-94 |
| Vendor | i18next |
| Product | i18nextify |
| Published | May 7, 2026 |
Get instant alerts for i18next i18nextify
Be the first to know when new medium vulnerabilities affecting i18next i18nextify are published โ delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N