A vulnerability was identified in tarteaucitron.js where document.currentScript was accessed without verifying that it referenced an actual <script>
element. If an attacker injected an HTML element such as:
<img name="currentScript" src="https://malicious.example.com">
it could clobber the document.currentScript property. This causes the script to resolve incorrectly to an <img> element instead of the <script> tag, leading to unexpected behavior or failure to load the script path correctly.
This issue arises because in some browser environments, named DOM elements (e.g., name="currentScript") become properties on the global document object.
An attacker with control over the HTML could exploit this to change the CDN domain of tarteaucitron.
The issue was resolved by verifying that document.currentScript is an instance of HTMLScriptElement. If not, the script now falls back safely to the last <script> tag on the page.
{ "severity": "MODERATE", "github_reviewed_at": "2025-07-03T16:59:09Z", "cwe_ids": [ "CWE-138" ], "github_reviewed": true, "nvd_published_at": "2025-07-03T17:15:39Z" }