Template Literal Injection Vulnerability in esm.sh CDN Service
CVE-2025-65026

6.1MEDIUM

Key Information:

Vendor

Esm-dev

Status
Vendor
CVE Published:
19 November 2025

What is CVE-2025-65026?

The esm.sh CDN service is vulnerable to Template Literal Injection due to improper sanitization during CSS-to-JavaScript module conversion. When CSS files with the ?module query parameter are processed, the CDN embeds CSS content into JavaScript template literals without adequate validation. This flaw allows attackers to inject malicious JavaScript code via ${...} expressions in CSS files, leading to potential Cross-Site Scripting (XSS) attacks in web browsers and Remote Code Execution (RCE) in Electron-based applications. Vulnerability mitigation has been implemented in version 136.

Affected Version(s)

esm.sh < 136

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-65026 : Template Literal Injection Vulnerability in esm.sh CDN Service