Impact
The vulnerability allows an attacker to inject characters into the language (lng) and namespace (ns) parameters that are interpolated directly into the URL template used by the i18next-http-backend. This unsanitised input enables path traversal and broader URL‑structure injection (CWE‑22, CWE‑74). An exploit can cause the backend to request arbitrary files from the application’s file system or perform server‑side request forgery against external resources, leading to potential information disclosure or other server‑side side effects.
Affected Systems
i18next i18next-http-backend versions prior to 3.0.5 are affected. The issue exists in JavaScript applications that use the i18next-http-backend package and allow user‑controlled language selection via query parameters, cookies, or headers.
Risk and Exploitability
The CVSS score for this issue is 6.5, indicating medium severity. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be remote via user‑controlled input to the language selector, as the description mentions query parameters, cookies, localStorage, and request headers. While no public exploit is reported, the potential to retrieve arbitrary files or external resources makes this a moderate risk, especially for applications that expose the language selection to end users.
OpenCVE Enrichment
Github GHSA