Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. ip-address
  4. ›
  5. CVE-2026-42338

CVE-2026-42338: ip-address has XSS in Address6 HTML-emitting methods

May 5, 2026

Address6.group() and Address6.link() do not HTML-escape attacker-controlled content before embedding it in the HTML strings they return, and AddressError.parseMessage (emitted by the Address6 constructor for invalid input) can contain unescaped attacker-controlled content in one branch. An application that (1) passes untrusted input to Address6 and (2) renders the output of these methods, or the thrown error’s parseMessage, as HTML (e.g. via innerHTML) is vulnerable to cross-site scripting. A related issue in v6.helpers.spanAll() produced malformed markup but was not exploitable; it is hardened in the same release for consistency.

References

  • github.com/advisories/GHSA-v2v4-37r5-5v8g
  • github.com/beaugunderson/ip-address
  • github.com/beaugunderson/ip-address/security/advisories/GHSA-v2v4-37r5-5v8g
  • nvd.nist.gov/vuln/detail/CVE-2026-42338

Code Behaviors & Features

Detect and mitigate CVE-2026-42338 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 10.1.1

Fixed versions

  • 10.1.1

Solution

Upgrade to version 10.1.1 or above.

Impact 5.4 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

npm/ip-address/CVE-2026-42338.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 00:20:38 +0000.