Description
On HTML elements handled by Orejime, one could run malicious code by embedding javascript: code within data attributes. When consenting to the related purpose, Orejime would turn data attributes into unprefixed ones (i.e. data-href into href), thus executing the code.
Recommendation
Update the orejime package to the latest compatible version. Followings are version details:
- Affected version(s): < 2.3.2
- Patched version(s): 2.3.2
References
Related Issues
- jQuery vulnerable to Cross-Site Scripting (XSS) - CVE-2011-4969
- Remote code execution via the `pretty` option. - CVE-2021-21353
- Vite bypasses server.fs.deny when using ?raw?? - CVE-2025-30208
- GetmeUK ContentTools Cross-Site Scripting (XSS) - CVE-2025-2699
- Tags:
- npm
- orejime
Anything's wrong? Let us know Last updated on January 13, 2026