CVE-2025-68457

Source
https://cve.org/CVERecord?id=CVE-2025-68457
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68457.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-68457
Aliases
Published
2025-12-19T16:40:30.258Z
Modified
2026-01-15T05:52:58.459387Z
Severity
  • 0.6 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U CVSS Calculator
Summary
Orejime has executable code in HTML attributes
Details

Orejime is a consent manager that focuses on accessibility. On HTML elements handled by Orejime prior to version 2.3.2, one could run malicious code by embedding javascript: code within data attributes. When consenting to the related purpose, Orejime would turn data attributes into unprefixed ones (i.e. data-href into href), thus executing the code. This shouldn't have any impact on most setups, as elements handled by Orejime are generally hardcoded. The problem would only arise if somebody could inject HTML code within pages. The problem has been patched in version 2.3.2. As a workaround, the problem can be fixed outside of Orejime by sanitizing attributes which could contain executable code.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-79"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68457.json"
}
References

Affected packages

Git / github.com/boscop-fr/orejime

Affected ranges

Type
GIT
Repo
https://github.com/boscop-fr/orejime
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68457.json"