Description
nuxt/icon provides an API to allow client side icon lookup. This endpoint is at /api/_nuxt_icon/[name].
The proxied request path is improperly parsed, allowing an attacker to change the scheme and host of the request. This leads to SSRF, and could potentially lead to sensitive data exposure.
Recommendation
Update the @nuxt/icon package to the latest compatible version. Followings are version details:
- Affected version(s): <= 1.4.4
- Patched version(s): 1.4.5
References
Related Issues
- vite allows server.fs.deny bypass via backslash on Windows - CVE-2025-62522
- Vite's `server.fs` settings were not applied to HTML files - CVE-2025-58752
- OpenPGP.js's message signature verification can be spoofed - CVE-2025-47934
- Trix editor subject to XSS vulnerabilities on copy & paste - CVE-2024-53847
- Tags:
- npm
- @nuxt/icon
Anything's wrong? Let us know Last updated on August 06, 2024