Description
i18next-http-middleware is a middleware to be used with Node.js web frameworks like express or Fastify and also for Deno. Prior to version 3.9.3, i18next-http-middleware passes the user-controlled lng and ns values from getResourcesHandler directly into i18next.services.backendConnector.load(languages, namespaces, …) without any sanitization. Depending on which backend is configured, the unvalidated path segments enable either path traversal or SSRF. This issue has been patched in version 3.9.3.
Published: 2026-05-08
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

i18next-http-middleware allows a client to supply language and namespace parameters that are forwarded directly to the backend loader without sanitization. Depending on the configured backend, this can expose the server to local file read attacks or cause the server to perform arbitrary outbound HTTP requests, potentially leaking sensitive data or enabling further exploits. The vulnerability is not limited to a single file; the full path can be manipulated via the provided parameters, implying that a malicious actor could read files beyond the intended directory or reach internal services through SSRF.

Affected Systems

The problem exists in i18next-http-middleware for all versions prior to 3.9.3. Systems running this package as part of a Node.js web framework such as Express or Fastify, or in a Deno environment, are affected. The vulnerable component is the getResourcesHandler that invokes the backendConnector.load method with user-supplied parameters. Only the 3.9.3 release and later include the mitigation.

Risk and Exploitability

The CVSS score of 8.2 indicates a high severity vulnerability. While an EPSS score is not available, the lack of a CISA KEV entry suggests limited public exploitation at this time, but this does not reduce the risk to those running outdated versions. Attackers can trigger the issue by sending a crafted HTTP request that sets the language or namespace in the query string or request body. Depending on the backend, they can trigger either a local path traversal or an SSRF scenario. Because the flaw requires network access to the vulnerable application, it is predominantly a remote attack vector with potential for significant data exposure.

Generated by OpenCVE AI on May 8, 2026 at 19:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade i18next-http-middleware to version 3.9.3 or later
  • If an upgrade is not immediately possible, configure the middleware to validate language and namespace inputs against an allow list and disable backend connectors that can resolve arbitrary paths or perform outbound requests
  • Ensure that any self‑hosted backends are confined to safe directories and that SSRF‑capable backends have outbound access restricted or disabled

Generated by OpenCVE AI on May 8, 2026 at 19:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-jfgf-83c5-2c4m i18next-http-middleware has path traversal / SSRF via user-controlled language and namespace parameters
History

Sat, 09 May 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 08 May 2026 16:00:00 +0000

Type Values Removed Values Added
Description i18next-http-middleware is a middleware to be used with Node.js web frameworks like express or Fastify and also for Deno. Prior to version 3.9.3, i18next-http-middleware passes the user-controlled lng and ns values from getResourcesHandler directly into i18next.services.backendConnector.load(languages, namespaces, …) without any sanitization. Depending on which backend is configured, the unvalidated path segments enable either path traversal or SSRF. This issue has been patched in version 3.9.3.
Title Path traversal / SSRF in i18next-http-middleware via user-controlled language and namespace parameters
Weaknesses CWE-22
CWE-918
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-08T23:30:15.045Z

Reserved: 2026-04-26T13:26:14.515Z

Link: CVE-2026-42353

cve-icon Vulnrichment

Updated: 2026-05-08T23:30:06.475Z

cve-icon NVD

Status : Received

Published: 2026-05-08T16:16:12.197

Modified: 2026-05-08T16:16:12.197

Link: CVE-2026-42353

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T19:15:14Z

Weaknesses