๐Ÿ” CVE Alert

CVE-2026-42794

UNKNOWN 0.0

Reflected XSS via backslash bypass in GraphiQL js_escape in absinthe_plug

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Improper Neutralization of Input During Web Page Generation (XSS) vulnerability in absinthe-graphql absinthe_plug allows reflected cross-site scripting via the GraphiQL interface. 'Elixir.Absinthe.Plug.GraphiQL':js_escape/1 in lib/absinthe/plug/graphiql.ex escapes single quotes and newlines in the query GET parameter before embedding it in an inline JavaScript string, but does not escape backslashes. An attacker can bypass the escaping by prefixing a quote with a backslash (e.g. \'), breaking out of the string context and executing arbitrary JavaScript in the victim's browser. This issue affects absinthe_plug: from 1.2.0.

CWE CWE-79
Vendor absinthe-graphql
Product absinthe_plug
Published May 8, 2026
Last Updated May 8, 2026
Stay Ahead of the Next One

Get instant alerts for absinthe-graphql absinthe_plug

Be the first to know when new unknown vulnerabilities affecting absinthe-graphql absinthe_plug are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

absinthe-graphql / absinthe_plug
1.2.0 < *
absinthe-graphql / absinthe_plug
26241817cb4b9be4de3f5972c5fba3d36de3d713 < 23a0d5658d32420086711adf4ce8f05febb09963

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/absinthe-graphql/absinthe_plug/issues/275 cna.erlef.org: https://cna.erlef.org/cves/CVE-2026-42794.html osv.dev: https://osv.dev/vulnerability/EEF-CVE-2026-42794 github.com: https://github.com/absinthe-graphql/absinthe_plug/commit/23a0d5658d32420086711adf4ce8f05febb09963

Credits

40826d Bryan A. Enders Leandro Moreno Ben Wilson