UBUNTU-CVE-2026-42338

Source
https://ubuntu.com/security/CVE-2026-42338
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-42338.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-42338
Upstream
  • CVE-2026-42338
Published
2026-05-14T00:00:00Z
Modified
2026-05-14T14:45:07.472579Z
Severity
  • 5.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

ip-address is a library for parsing and manipulating IPv4 and IPv6 addresses in JavaScript. Prior to 10.1.1, Address6.group() and Address6.link() do not HTML-escape attacker-controlled content before embedding it in the HTML strings they return, and AddressError.parseMessage (emitted by the Address6 constructor for invalid input) can contain unescaped attacker-controlled content in one branch. An application that (1) passes untrusted input to Address6 and (2) renders the output of these methods, or the thrown error's parseMessage, as HTML (e.g. via innerHTML) is vulnerable to cross-site scripting. This vulnerability is fixed in 10.1.1.

References

Affected packages

Ubuntu:20.04:LTS / node-ip-address

Package

Name
node-ip-address
Purl
pkg:deb/ubuntu/node-ip-address@6.3.0-1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.3.0-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "node-ip-address",
            "binary_version": "6.3.0-1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-42338.json"

Ubuntu:22.04:LTS / node-ip-address

Package

Name
node-ip-address
Purl
pkg:deb/ubuntu/node-ip-address@8.1.0-2?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.4.0-1
8.*
8.1.0-2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "node-ip-address",
            "binary_version": "8.1.0-2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-42338.json"

Ubuntu:24.04:LTS / node-ip-address

Package

Name
node-ip-address
Purl
pkg:deb/ubuntu/node-ip-address@8.1.0-2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*
8.1.0-2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "node-ip-address",
            "binary_version": "8.1.0-2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-42338.json"

Ubuntu:25.10 / node-ip-address

Package

Name
node-ip-address
Purl
pkg:deb/ubuntu/node-ip-address@8.1.0-2?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*
8.1.0-2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "node-ip-address",
            "binary_version": "8.1.0-2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-42338.json"

Ubuntu:26.04 / node-ip-address

Package

Name
node-ip-address
Purl
pkg:deb/ubuntu/node-ip-address@8.1.0-3?arch=source&distro=resolute

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*
8.1.0-2
8.1.0-3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "node-ip-address",
            "binary_version": "8.1.0-3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-42338.json"