{"id":"CVE-2024-43370","summary":"gettext.js vulnerable to cross-site scripting (XSS)","details":"gettext.js is a GNU gettext port for node and the browser. There is a cross-site scripting (XSS) injection if `.po` dictionary definition files are corrupted. This vulnerability has been patched in version 2.0.3. As a workaround, control the origin of the definition catalog to prevent the use of this flaw in the definition of plural forms.","aliases":["GHSA-vwhg-jwr4-vxgg"],"modified":"2026-04-02T12:18:18.737209Z","published":"2024-08-15T23:44:47.808Z","database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43370.json","cwe_ids":["CWE-79"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43370.json"},{"type":"ADVISORY","url":"https://github.com/guillaumepotier/gettext.js/security/advisories/GHSA-vwhg-jwr4-vxgg"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43370"},{"type":"FIX","url":"https://github.com/guillaumepotier/gettext.js/commit/8150aeba833183e14c2291a8a148b8f79d1d68d8"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/guillaumepotier/gettext.js","events":[{"introduced":"0"},{"fixed":"5d18cb4e512eba1210ab7cead968ed85483323e4"}]}],"versions":["0.0.1","0.0.2","0.2.0","0.3.0","0.4.0","0.5.0","0.5.1","0.5.2","0.5.3","0.5.4","0.5.5","0.6.0","0.7.0","v0.8.0","v0.9.0","v1.0.0","v1.0.1","v1.1.0","v1.1.1","v1.2.0","v2.0.0","v2.0.1","v2.0.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-43370.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N"}]}