Cross-Site Scripting in ip-address Library Affecting JavaScript Applications
CVE-2026-42338

5.3MEDIUM

Key Information:

Vendor
CVE Published:
12 May 2026

What is CVE-2026-42338?

The ip-address library, which handles IPv4 and IPv6 address management in JavaScript, is vulnerable to cross-site scripting due to improper HTML escaping of attacker-controlled content. Specifically, prior to version 10.1.1, the methods Address6.group() and Address6.link() fail to escape potentially harmful content before embedding it into HTML strings, while the AddressError.parseMessage can inadvertently expose unescaped content in error messages when invalid input is processed. Applications that utilize these methods to render untrusted input as HTML are at risk, making it essential for developers to update to the latest version to mitigate these vulnerabilities.

Affected Version(s)

ip-address < 10.1.1

References

CVSS V4

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.