Back to VulnFeed / CVE-2026-42353
root@hackertop:~/vulnfeed/CVE-2026-42353#
CVE-2026-42353 HIGH SSRF ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

i18next i18next-http-middleware prior 3.9.3 languages/namespaces server-side request forgery

i18next-http-middleware 1d ago Impact pending confirmation
LIFECYCLE
7.0 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability has been found in i18next i18next-http-middleware (Middleware) and classified as critical. This vulnerability affects some unknown processing. Upgrading to version 3.9.3 eliminates this vulnerability.
Root Cause Analysis
The manipulation of the argument languages/namespaces with an unknown input leads to a unknown weakness. The CWE definition for the vulnerability is CWE-918. The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.

Impact: As an impact it is known to affect confidentiality, integrity, and availability.

Countermeasure: Upgrading to version 3.9.3 eliminates this vulnerability.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-42353 · CVSS 7.0 · Active Threat