{"id":"CVE-2024-10491","details":"A vulnerability has been identified in the Express response.links function, allowing for arbitrary resource injection in the Link header when unsanitized data is used.\n\nThe issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `\u003c\u003e` to preload malicious resources.\n\nThis vulnerability is especially relevant for dynamic parameters.","aliases":["GHSA-cm5g-3pgc-8rg4"],"modified":"2026-04-10T05:08:06.961843Z","published":"2024-10-29T17:15:03.853Z","references":[{"type":"EVIDENCE","url":"https://www.herodevs.com/vulnerability-directory/cve-2024-10491"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-10491.json","unresolved_ranges":[{"events":[{"introduced":"3.0.0"},{"fixed":"3.21.5"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}]}