{"id":"CVE-2024-51757","summary":"Fixes security vulnerability that allowed for server side code to be executed by a \u003cscript\u003e tag","details":"happy-dom is a JavaScript implementation of a web browser without its graphical user interface. Versions of happy-dom prior to 15.10.2 may execute code on the host via a script tag. This would execute code in the user context of happy-dom. Users are advised to upgrade to version 15.10.2. There are no known workarounds for this vulnerability.","aliases":["GHSA-96g7-g7g9-jxw8"],"modified":"2026-04-10T05:16:12.150628Z","published":"2024-11-06T19:18:23.923Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/51xxx/CVE-2024-51757.json","cwe_ids":["CWE-79","CWE-94"],"cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://github.com/capricorn86/happy-dom/releases/tag/v15.10.2"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/51xxx/CVE-2024-51757.json"},{"type":"ADVISORY","url":"https://github.com/capricorn86/happy-dom/security/advisories/GHSA-96g7-g7g9-jxw8"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-51757"},{"type":"REPORT","url":"https://github.com/capricorn86/happy-dom/issues/1585"},{"type":"FIX","url":"https://github.com/capricorn86/happy-dom/commit/5ee0b1676d4ce20cc2a70d1c9c8d6f1e3f57efac"},{"type":"FIX","url":"https://github.com/capricorn86/happy-dom/commit/d23834c232f1cf5519c9418b073f1dcec6b2f0fd"},{"type":"FIX","url":"https://github.com/capricorn86/happy-dom/pull/1586"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/capricorn86/happy-dom","events":[{"introduced":"0"},{"fixed":"5ee0b1676d4ce20cc2a70d1c9c8d6f1e3f57efac"}]},{"type":"GIT","repo":"https://github.com/capricorn86/happy-dom","events":[{"introduced":"0"},{"fixed":"d23834c232f1cf5519c9418b073f1dcec6b2f0fd"}]},{"type":"GIT","repo":"https://github.com/capricorn86/happy-dom","events":[{"introduced":"0"},{"fixed":"d23834c232f1cf5519c9418b073f1dcec6b2f0fd"}]}],"versions":["v0.0.1","v0.1.0","v0.10.0","v0.10.1","v0.10.6","v0.10.7","v0.11.0","v0.11.1","v0.12.0","v0.13.0","v0.14.0","v0.2.0","v0.2.16","v0.3.0","v0.3.1","v0.4.0","v0.4.1","v0.4.2","v0.4.3","v0.4.4","v0.5.0","v0.6.0","v0.7.0","v0.8.0","v0.8.3","v0.8.4","v0.8.5","v0.9.0","v10.0.0","v10.0.1","v10.0.2","v10.0.3","v10.0.4","v10.0.5","v10.0.6","v10.0.7","v10.1.0","v10.1.1","v10.10.0","v10.10.1","v10.10.2","v10.10.3","v10.10.4","v10.11.0","v10.11.1","v10.11.2","v10.2.0","v10.3.0","v10.3.1","v10.3.2","v10.4.0","v10.5.0","v10.5.1","v10.5.2","v10.5.3","v10.6.0","v10.6.1","v10.6.2","v10.6.3","v10.7.0","v10.8.0","v10.8.1","v10.9.0","v11.0.0","v11.0.1","v11.0.2","v11.0.3","v11.0.4","v11.0.5","v11.0.6","v11.1.0","v11.1.1","v11.1.2","v11.2.0","v12.0.0","v12.0.1","v12.1.0","v12.1.1","v12.1.2","v12.1.3","v12.1.4","v12.1.5","v12.1.6","v12.1.7","v12.10.0","v12.10.1","v12.10.2","v12.10.3","v12.2.0","v12.2.1","v12.2.2","v12.3.0","v12.4.0","v12.5.0","v12.5.1","v12.6.0","v12.7.0","v12.8.0","v12.8.1","v12.9.0","v12.9.1","v12.9.2","v13.0.0","v13.0.1","v13.0.2","v13.0.3","v13.0.4","v13.0.5","v13.0.6","v13.0.7","v13.1.0","v13.1.1","v13.1.2","v13.1.3","v13.1.4","v13.10.0","v13.10.1","v13.2.0","v13.2.1","v13.2.2","v13.3.0","v13.3.1","v13.3.2","v13.3.3","v13.3.4","v13.3.5","v13.3.6","v13.3.7","v13.3.8","v13.4.0","v13.4.1","v13.5.0","v13.5.1","v13.5.2","v13.5.3","v13.6.0","v13.6.1","v13.6.2","v13.7.0","v13.7.1","v13.7.2","v13.7.3","v13.7.4","v13.7.5","v13.7.6","v13.7.7","v13.7.8","v13.8.0","v13.8.1","v13.8.2","v13.8.3","v13.8.4","v13.8.5","v13.8.6","v13.9.0","v14.0.0","v14.1.0","v14.1.1","v14.1.2","v14.10.0","v14.10.1","v14.10.2","v14.10.3","v14.11.0","v14.11.1","v14.11.2","v14.11.3","v14.11.4","v14.12.0","v14.12.1","v14.12.2","v14.12.3","v14.2.0","v14.2.1","v14.3.0","v14.3.1","v14.3.10","v14.3.2","v14.3.3","v14.3.4","v14.3.5","v14.3.6","v14.3.7","v14.3.8","v14.3.9","v14.4.0","v14.5.0","v14.5.1","v14.5.2","v14.6.0","v14.6.1","v14.6.2","v14.7.0","v14.7.1","v14.8.0","v14.8.1","v14.8.2","v14.8.3","v14.9.0","v15.0.0","v15.1.0","v15.10.0","v15.10.1","v15.2.0","v15.3.0","v15.3.1","v15.3.2","v15.4.0","v15.4.1","v15.4.2","v15.4.3","v15.5.0","v15.6.0","v15.6.1","v15.7.0","v15.7.1","v15.7.2","v15.7.3","v15.7.4","v15.8.0","v15.8.1","v15.8.2","v15.8.3","v15.8.4","v15.8.5","v15.9.0","v8.3.0","v8.3.1","v8.3.2","v8.4.0","v8.4.1","v8.4.2","v8.4.3","v8.4.4","v8.5.0","v8.6.0","v8.7.0","v8.7.1","v8.7.2","v8.7.3","v8.7.4","v8.7.5","v8.7.6","v8.8.0","v8.9.0","v9.0.0","v9.0.1","v9.1.0","v9.1.1","v9.1.10","v9.1.2","v9.1.3","v9.1.4","v9.1.5","v9.1.6","v9.1.7","v9.1.8","v9.1.9","v9.10.0","v9.10.1","v9.10.2","v9.10.3","v9.10.4","v9.10.5","v9.10.6","v9.10.7","v9.10.8","v9.10.9","v9.11.0","v9.12.0","v9.13.0","v9.13.1","v9.14.0","v9.15.0","v9.16.0","v9.17.0","v9.18.0","v9.18.1","v9.18.2","v9.18.3","v9.19.0","v9.19.1","v9.19.2","v9.2.0","v9.2.1","v9.20.0","v9.20.1","v9.20.2","v9.20.3","v9.3.0","v9.3.1","v9.3.2","v9.4.0","v9.5.0","v9.5.1","v9.6.0","v9.6.1","v9.7.0","v9.7.1","v9.8.0","v9.8.1","v9.8.2","v9.8.3","v9.8.4","v9.9.0","v9.9.1","v9.9.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-51757.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}]}