Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. orejime
  4. ›
  5. CVE-2025-68457

CVE-2025-68457: Orejime has executable code in HTML attributes

December 19, 2025 (updated January 13, 2026)

On HTML elements handled by Orejime, one could run malicious code by embedding javascript: code within data attributes. When consenting to the related purpose, Orejime would turn data attributes into unprefixed ones (i.e. data-href into href), thus executing the code.

This shouldn’t have any impact on most setups, as elements handled by Orejime are generally hardcoded. The problem would only arise if somebody could inject HTML code within pages.

See https://github.com/boscop-fr/orejime/issues/142 for the original report.

References

  • github.com/advisories/GHSA-72mh-hgpm-6384
  • github.com/boscop-fr/orejime
  • github.com/boscop-fr/orejime/issues/142
  • github.com/boscop-fr/orejime/pull/143
  • github.com/boscop-fr/orejime/security/advisories/GHSA-72mh-hgpm-6384
  • nvd.nist.gov/vuln/detail/CVE-2025-68457

Code Behaviors & Features

Detect and mitigate CVE-2025-68457 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.3.2

Fixed versions

  • 2.3.2

Solution

Upgrade to version 2.3.2 or above.

Impact 6.1 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

npm/orejime/CVE-2025-68457.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:35:43 +0000.