Description
Dioxus Components is a shadcn-style component library for the Dioxus app framework. Prior to commit 41e4242ecb1062d04ae42a5215363c1d9fd4e23a, `use_animated_open` formats a string for `eval` with an `id` that can be user supplied. Commit 41e4242ecb1062d04ae42a5215363c1d9fd4e23a patches the issue.
Published: 2026-01-23
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Code Execution via JavaScript injection
Action: Apply Patch
AI Analysis

Impact

A flaw in the Dioxus Components library causes the use_animated_open helper to build a string that is later run through JavaScript's eval function, using an identifier that can be controlled by the end user. If an attacker supplies a specially crafted ID, arbitrary JavaScript code will execute in the context of the browser window that renders the component. This introduces the potential for cross‑site scripting, theft of credentials stored in the client, or modification of the page’s content, resulting in a loss of confidentiality and integrity for users of applications that embed this component.

Affected Systems

The vulnerability exists in all releases of DioxusLabs:components before commit 41e4242ecb1062d04ae42a5215363c1d9fd4e23a. Any application that imports the components library and uses the use_animated_open helper with user‑supplied ID values is affected. Updating to the patched commit or any subsequent release eliminates the flaw.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate risk, and the EPSS score of less than 1% suggests that exploit attempts are currently unlikely. The vulnerability is not listed in CISA’s KEV catalog, and there are no public exploit references. The attack requires elevation of a user‑supplied ID value to the component rendering code, which means a malicious actor could craft an input that triggers eval when the component is rendered. Because the flaw uses eval on controlled data, it is considered a code injection risk (CWE‑94, CWE‑95).

Generated by OpenCVE AI on April 18, 2026 at 15:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Dioxus Components library to commit 41e4242ecb1062d04ae42a5215363c1d9fd4e23a or a later stable release.
  • Sanitize or remove any user-supplied IDs before they reach the use_animated_open helper, ensuring that eval is never called with uncontrolled data.
  • Audit the application for any other instances of eval or dynamic code execution with user input and refactor those areas to use safe alternatives.

Generated by OpenCVE AI on April 18, 2026 at 15:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Dioxuslabs
Dioxuslabs components
Vendors & Products Dioxuslabs
Dioxuslabs components

Sat, 24 Jan 2026 00:00:00 +0000

Type Values Removed Values Added
Description Dioxus Components is a shadcn-style component library for the Dioxus app framework. Prior to commit 41e4242ecb1062d04ae42a5215363c1d9fd4e23a, `use_animated_open` formats a string for `eval` with an `id` that can be user supplied. Commit 41e4242ecb1062d04ae42a5215363c1d9fd4e23a patches the issue.
Title Dioxus Components has JavaScript injection via user-supplied IDs
Weaknesses CWE-94
CWE-95
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Dioxuslabs Components
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-26T17:07:29.574Z

Reserved: 2026-01-23T00:38:20.547Z

Link: CVE-2026-24474

cve-icon Vulnrichment

Updated: 2026-01-26T17:07:14.900Z

cve-icon NVD

Status : Deferred

Published: 2026-01-24T00:15:49.603

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24474

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T15:15:03Z

Weaknesses