Impact
i18next‑locize‑backend allows unencoded interpolation of language, namespace, project identifier, and version into request URL templates. A crafted value supplied through query parameters, cookies, request headers, or a URL‑derived projectId can alter the structure of outgoing URLs, enabling the application to send requests to arbitrary locations or manipulate path components. This flaw is covered by CWE‑22 (Path Traversal) and CWE‑74 (URL Injection) and can lead to data leakage, unauthorized access, or execution of unintended server requests.
Affected Systems
The vulnerability affects the locize i18next‑locize‑backend package for Node.js, browser, and Deno environments, specifically any version prior to 9.0.2.
Risk and Exploitability
The Advisory assigns a CVSS score of 6.5, indicating medium severity. EPSS is not available, and the flaw is not listed in the CISA KEV catalog. The attack path relies on user‑controlled input into the specified parameters; the absence of path validation or encoding makes it feasible for an attacker to forge arbitrary URLs. In environments where the application accepts public traffic, this could allow server‑side request forgery, potentially exposing internal services or data.
OpenCVE Enrichment
Github GHSA