Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-31476
Summary
The package tarteaucitronjs is a compliant and accessible cookie banner. A vulnerability was identified in 'tarteaucitron.js', allowing a user with high privileges (access to the site's source code or a CMS plugin) to enter a URL containing an insecure scheme such as 'javascript:alert()'. Before the fix, URL validation was insufficient, which could allow arbitrary JavaScript execution if a user clicked on a malicious link. An attacker with high privileges could insert a link exploiting an insecure URL scheme, leading to the execution of arbitrary JavaScript code, theft of sensitive data through phishing attacks, or modification of the user interface behavior. This issue affects versions through 1.19.0.
- LOW
- NETWORK
- LOW
- CHANGED
- REQUIRED
- HIGH
- LOW
- NONE
CWE-79 - Cross Site Scripting
Cross-Site Scripting, commonly referred to as XSS, is the most dominant class of vulnerabilities. It allows an attacker to inject malicious code into a pregnable web application and victimize its users. The exploitation of such a weakness can cause severe issues such as account takeover, and sensitive data exfiltration. Because of the prevalence of XSS vulnerabilities and their high rate of exploitation, it has remained in the OWASP top 10 vulnerabilities for years.
References
Advisory Timeline
- Published