Description
esm.sh is a nobuild content delivery network(CDN) for modern web development. Prior to version 136, The esm.sh CDN service contains a Template Literal Injection vulnerability (CWE-94) in its CSS-to-JavaScript module conversion feature. When a CSS file is requested with the ?module query parameter, esm.sh converts it to a JavaScript module by embedding the CSS content directly into a template literal without proper sanitization. An attacker can inject malicious JavaScript code using ${...} expressions within CSS files, which will execute when the module is imported by victim applications. This enables Cross-Site Scripting (XSS) in browsers and Remote Code Execution (RCE) in Electron applications. This issue has been patched in version 136.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hcpf-qv9m-vfgp | esm.sh CDN service has JS Template Literal Injection in CSS-to-JavaScript |
References
History
Thu, 15 Jan 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Esm
Esm esm.sh |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:esm:esm.sh:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Esm
Esm esm.sh |
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Esm-dev
Esm-dev esmsh |
|
| Vendors & Products |
Esm-dev
Esm-dev esmsh |
Wed, 19 Nov 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | esm.sh is a nobuild content delivery network(CDN) for modern web development. Prior to version 136, The esm.sh CDN service contains a Template Literal Injection vulnerability (CWE-94) in its CSS-to-JavaScript module conversion feature. When a CSS file is requested with the ?module query parameter, esm.sh converts it to a JavaScript module by embedding the CSS content directly into a template literal without proper sanitization. An attacker can inject malicious JavaScript code using ${...} expressions within CSS files, which will execute when the module is imported by victim applications. This enables Cross-Site Scripting (XSS) in browsers and Remote Code Execution (RCE) in Electron applications. This issue has been patched in version 136. | |
| Title | esm.sh CDN service has JS Template Literal Injection in CSS-to-JavaScript | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-20T14:19:17.852Z
Reserved: 2025-11-13T15:36:51.682Z
Link: CVE-2025-65026
No data.
Status : Analyzed
Published: 2025-11-19T18:15:50.023
Modified: 2026-01-15T17:53:57.380
Link: CVE-2025-65026
No data.
OpenCVE Enrichment
Updated: 2025-11-24T09:10:26Z
Github GHSA