| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-v2v4-37r5-5v8g | ip-address has XSS in Address6 HTML-emitting methods |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Beaugunderson
Beaugunderson ip-address |
|
| Vendors & Products |
Beaugunderson
Beaugunderson ip-address |
Tue, 12 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ip-address is a library for parsing and manipulating IPv4 and IPv6 addresses in JavaScript. Prior to 10.1.1, Address6.group() and Address6.link() do not HTML-escape attacker-controlled content before embedding it in the HTML strings they return, and AddressError.parseMessage (emitted by the Address6 constructor for invalid input) can contain unescaped attacker-controlled content in one branch. An application that (1) passes untrusted input to Address6 and (2) renders the output of these methods, or the thrown error's parseMessage, as HTML (e.g. via innerHTML) is vulnerable to cross-site scripting. This vulnerability is fixed in 10.1.1. | |
| Title | ip-address: XSS in Address6 HTML-emitting methods | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T14:46:50.469Z
Reserved: 2026-04-26T13:26:14.514Z
Link: CVE-2026-42338
Updated: 2026-05-13T14:46:43.960Z
Status : Received
Published: 2026-05-12T20:16:41.130
Modified: 2026-05-12T20:16:41.130
Link: CVE-2026-42338
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:36:15Z
Github GHSA