Description
DeepL Chrome browser extension versions from v1.22.0 to v.1.23.0 contain a cross-site scripting vulnerability, which allows an attacker to execute arbitrary script in a user's browser, and inject malicious HTML into web pages viewed by the user.
Published: 2026-04-22
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via injected scripts
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a client‑side cross‑site scripting flaw in the DeepL Chrome browser extension. Versions 1.22.0 through 1.23.0 allow an attacker to inject malicious JavaScript and arbitrary HTML into web pages viewed by the user. This enables execution of attacker‑controlled code in the context of the user’s browsing session, potentially leading to data theft, credential compromise, or other malicious activity, because the script runs with the permissions granted to the extension.

Affected Systems

This flaw affects the DeepL Chrome browser extension for all users who have versions 1.22.0 up to and including 1.23.0 installed. The extension is distributed via the Chrome Web Store, and users of any operating system running Chrome or Chromium‑based browsers that support extensions are at risk. Specific product names are DeepL Chrome extension.

Risk and Exploitability

The CVSS base score of 5.1 indicates a moderate severity. The EPSS score is not available, so current exploitation probability is unknown. The vulnerability is not listed in the CISA KEV catalog, suggesting no publicly known exploitation at the time of this assessment. The likely attack vector is a malicious web page that the user visits or a compromised site that loads the extension’s content scripts, which can inject the malicious payload. Once activated, the script runs with the privileges granted to the extension, providing the attacker with a high level of influence over the user’s browsing environment.

Generated by OpenCVE AI on April 22, 2026 at 07:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the DeepL Chrome extension to the latest available version, which removes the XSS vulnerability.
  • If an upgrade is not immediately feasible, disable or uninstall the extension to prevent script execution until a fix is applied.
  • Implement a site‑wide Content Security Policy that restricts inline script execution, thereby mitigating the impact of any residual injection vectors.

Generated by OpenCVE AI on April 22, 2026 at 07:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Deepl
Deepl chrome Browser Extension
Vendors & Products Deepl
Deepl chrome Browser Extension

Wed, 22 Apr 2026 07:30:00 +0000

Type Values Removed Values Added
Title Cross‑Site Scripting in DeepL Chrome Extension Enables Arbitrary Script Execution

Wed, 22 Apr 2026 05:00:00 +0000

Type Values Removed Values Added
Description DeepL Chrome browser extension versions from v1.22.0 to v.1.23.0 contain a cross-site scripting vulnerability, which allows an attacker to execute arbitrary script in a user's browser, and inject malicious HTML into web pages viewed by the user.
Weaknesses CWE-79
References
Metrics cvssV3_0

{'score': 6.1, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Deepl Chrome Browser Extension
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2026-04-22T12:38:36.513Z

Reserved: 2026-04-13T06:27:03.647Z

Link: CVE-2026-40451

cve-icon Vulnrichment

Updated: 2026-04-22T12:38:18.649Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-22T05:16:23.253

Modified: 2026-04-22T21:23:52.620

Link: CVE-2026-40451

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T11:44:48Z

Weaknesses