Description
i18next-http-middleware is a middleware to be used with Node.js web frameworks like express or Fastify and also for Deno. Prior to version 3.9.3, i18next-http-middleware wrote user-controlled language values into the Content-Language response header after passing them through utils.escape(), which is an HTML-entity encoder that does not strip carriage return, line feed, or other control characters. When the application used an older i18next (< 19.5.0) that still exercised the backward-compatibility fallback at LanguageDetector.js:100 or otherwise produced a raw detected value, CRLF sequences in the attacker-controlled lng parameter reached res.setHeader('Content-Language', ...) verbatim. This issue has been patched in version 3.9.3.
Published: 2026-05-08
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability allows attackers to inject carriage return and line feed characters into the Content‑Language response header, which leads to HTTP response splitting. This can result in header injection and potentially cause a denial of service by corrupting the response. The flaw originates from the use of an HTML‑entity encoder that does not filter control characters, and the issue is mitigated by updating to i18next‑http‑middleware 3.9.3 and ensuring i18next is at least 19.5.0.

Affected Systems

Applications built with Node.js web frameworks such as Express or Fastify that use the i18next‑http‑middleware package older than version 3.9.3 are affected, especially when they run i18next versions below 19.5.0 that still invoke the backward‑compatibility fallback in LanguageDetector.js. Systems employing these components are therefore vulnerable.

Risk and Exploitability

The module carries a CVSS score of 8.6, indicating a high severity. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is an HTTP request that supplies an attacker‑controlled lng parameter containing CRLF sequences; this vector could be leveraged to perform response splitting and potentially disrupt application behavior or serve as a stepping stone for further attacks. Cross‑site scripting is not directly supported by the vulnerability description.

Generated by OpenCVE AI on May 8, 2026 at 19:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the i18next‑http‑middleware package to version 3.9.3 or later.
  • Upgrade i18next to version 19.5.0 or later to disable the backward‑compatibility fallback that may supply unsanitized language values.
  • Validate or sanitize the lng query parameter, removing CRLF and other control characters before it is used to set the Content‑Language header or reject requests that contain such characters.

Generated by OpenCVE AI on May 8, 2026 at 19:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-c3h8-g69v-pjrg i18next-http-middleware: HTTP response splitting and DoS via unsanitised Content-Language header
History

Sat, 09 May 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 08 May 2026 16:00:00 +0000

Type Values Removed Values Added
Description i18next-http-middleware is a middleware to be used with Node.js web frameworks like express or Fastify and also for Deno. Prior to version 3.9.3, i18next-http-middleware wrote user-controlled language values into the Content-Language response header after passing them through utils.escape(), which is an HTML-entity encoder that does not strip carriage return, line feed, or other control characters. When the application used an older i18next (< 19.5.0) that still exercised the backward-compatibility fallback at LanguageDetector.js:100 or otherwise produced a raw detected value, CRLF sequences in the attacker-controlled lng parameter reached res.setHeader('Content-Language', ...) verbatim. This issue has been patched in version 3.9.3.
Title HTTP response splitting and DoS in i18next-http-middleware via unsanitised Content-Language header
Weaknesses CWE-113
CWE-79
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-08T23:29:00.230Z

Reserved: 2026-04-22T03:53:24.406Z

Link: CVE-2026-41683

cve-icon Vulnrichment

Updated: 2026-05-08T23:28:52.247Z

cve-icon NVD

Status : Received

Published: 2026-05-08T16:16:11.320

Modified: 2026-05-08T16:16:11.320

Link: CVE-2026-41683

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T19:45:15Z

Weaknesses