First published: Wed Feb 01 2023(Updated: )
Eta is an embedded JS templating engine that works inside Node, Deno, and the browser. XSS attack - anyone using the Express API is impacted. The problem has been resolved. Users should upgrade to version 2.0.0. As a workaround, don't pass user supplied things directly to `res.render`.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Math.js | <2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23630 is a vulnerability in the Eta templating engine which allows for cross-site scripting (XSS) attacks.
Anyone using the Eta templating engine with the Express API is impacted by CVE-2023-23630.
To protect yourself from CVE-2023-23630, upgrade to version 2.0.0 of the Eta templating engine and avoid passing user-supplied input directly to `res.render`.
CVE-2023-23630 has a severity rating of high, with a CVSS score of 6.1.
More information about CVE-2023-23630 can be found at the following references: [GitHub Commit](https://github.com/eta-dev/eta/commit/5651392462ee0ff19d77c8481081a99e5b9138dd), [GitHub Release](https://github.com/eta-dev/eta/releases/tag/v2.0.0), [GitHub Security Advisory](https://github.com/eta-dev/eta/security/advisories/GHSA-xrh7-m5pp-39r6).