CVE-2026-34405: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nuxt-modules og-image
CVE-2026-34405 is a medium severity cross-site scripting (XSS) vulnerability in the nuxt-modules og-image component prior to version 6. 2. 5. The vulnerability allows attackers to inject arbitrary HTML attributes into the page body via the image-generation URI endpoints, leading to potential script execution. Exploitation requires user interaction but no authentication, and the flaw affects the URI paths /_og/d/ and older /og-image/. This vulnerability impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild. The issue has been patched in version 6. 2. 5, and users should upgrade promptly.
AI Analysis
Technical Summary
CVE-2026-34405 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting the nuxt-modules og-image component, which generates Open Graph images using Vue templates within Nuxt.js applications. Prior to version 6.2.5, the image-generation endpoints at /_og/d/ and, in older versions, /og-image/ improperly neutralize user input during web page generation. This improper input sanitization allows attackers to inject arbitrary HTML attributes into the page body, which can lead to the execution of malicious scripts in the context of the victim's browser. The vulnerability does not require authentication but does require user interaction, such as visiting a crafted URL. The CVSS v3.1 base score is 6.1, reflecting medium severity with network attack vector, low attack complexity, no privileges required, user interaction required, and a scope change that affects confidentiality and integrity but not availability. While no known exploits have been reported in the wild, the vulnerability poses a risk to applications that dynamically generate OG images using the affected component. The flaw can be leveraged to steal sensitive information, perform session hijacking, or conduct phishing attacks by injecting malicious scripts. The issue was publicly disclosed on March 31, 2026, and patched in version 6.2.5 of the nuxt-modules og-image package. Developers and organizations using versions prior to 6.2.5 should upgrade immediately to mitigate the risk.
Potential Impact
The vulnerability enables attackers to execute arbitrary scripts in users' browsers by injecting malicious HTML attributes into dynamically generated Open Graph image pages. This can compromise user confidentiality by stealing cookies, tokens, or other sensitive data accessible via the browser. Integrity may be affected as attackers can manipulate page content or perform actions on behalf of users. Although availability is not impacted, the reputational damage and potential data breaches pose significant risks. Organizations relying on nuxt-modules og-image for social media previews or dynamic image generation may inadvertently expose their users to phishing or session hijacking attacks. The medium CVSS score reflects the moderate ease of exploitation combined with the requirement for user interaction. The scope change indicates that the vulnerability affects components beyond the immediate vulnerable code, potentially impacting other parts of the application or user sessions. Since no exploits are currently known in the wild, the risk is mitigated somewhat but remains significant for unpatched systems. Attackers could craft URLs that, when visited by users, trigger the injection and execution of malicious scripts, making public-facing web applications particularly vulnerable.
Mitigation Recommendations
The primary mitigation is to upgrade the nuxt-modules og-image package to version 6.2.5 or later, where the vulnerability has been patched. For organizations unable to upgrade immediately, implement strict input validation and sanitization on all user-supplied data used in generating Open Graph images. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Monitor web server logs for suspicious requests targeting the vulnerable endpoints (/ _og/d/ and /og-image/). Use web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting these URIs. Educate developers on secure coding practices, especially regarding template rendering and user input handling in Vue and Nuxt.js environments. Conduct regular security assessments and penetration testing focusing on dynamic content generation features. Finally, ensure that all dependencies are kept up to date and subscribe to vulnerability advisories for timely patching.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Japan, South Korea, India
CVE-2026-34405: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nuxt-modules og-image
Description
CVE-2026-34405 is a medium severity cross-site scripting (XSS) vulnerability in the nuxt-modules og-image component prior to version 6. 2. 5. The vulnerability allows attackers to inject arbitrary HTML attributes into the page body via the image-generation URI endpoints, leading to potential script execution. Exploitation requires user interaction but no authentication, and the flaw affects the URI paths /_og/d/ and older /og-image/. This vulnerability impacts confidentiality and integrity but not availability. No known exploits are currently reported in the wild. The issue has been patched in version 6. 2. 5, and users should upgrade promptly.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-34405 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting the nuxt-modules og-image component, which generates Open Graph images using Vue templates within Nuxt.js applications. Prior to version 6.2.5, the image-generation endpoints at /_og/d/ and, in older versions, /og-image/ improperly neutralize user input during web page generation. This improper input sanitization allows attackers to inject arbitrary HTML attributes into the page body, which can lead to the execution of malicious scripts in the context of the victim's browser. The vulnerability does not require authentication but does require user interaction, such as visiting a crafted URL. The CVSS v3.1 base score is 6.1, reflecting medium severity with network attack vector, low attack complexity, no privileges required, user interaction required, and a scope change that affects confidentiality and integrity but not availability. While no known exploits have been reported in the wild, the vulnerability poses a risk to applications that dynamically generate OG images using the affected component. The flaw can be leveraged to steal sensitive information, perform session hijacking, or conduct phishing attacks by injecting malicious scripts. The issue was publicly disclosed on March 31, 2026, and patched in version 6.2.5 of the nuxt-modules og-image package. Developers and organizations using versions prior to 6.2.5 should upgrade immediately to mitigate the risk.
Potential Impact
The vulnerability enables attackers to execute arbitrary scripts in users' browsers by injecting malicious HTML attributes into dynamically generated Open Graph image pages. This can compromise user confidentiality by stealing cookies, tokens, or other sensitive data accessible via the browser. Integrity may be affected as attackers can manipulate page content or perform actions on behalf of users. Although availability is not impacted, the reputational damage and potential data breaches pose significant risks. Organizations relying on nuxt-modules og-image for social media previews or dynamic image generation may inadvertently expose their users to phishing or session hijacking attacks. The medium CVSS score reflects the moderate ease of exploitation combined with the requirement for user interaction. The scope change indicates that the vulnerability affects components beyond the immediate vulnerable code, potentially impacting other parts of the application or user sessions. Since no exploits are currently known in the wild, the risk is mitigated somewhat but remains significant for unpatched systems. Attackers could craft URLs that, when visited by users, trigger the injection and execution of malicious scripts, making public-facing web applications particularly vulnerable.
Mitigation Recommendations
The primary mitigation is to upgrade the nuxt-modules og-image package to version 6.2.5 or later, where the vulnerability has been patched. For organizations unable to upgrade immediately, implement strict input validation and sanitization on all user-supplied data used in generating Open Graph images. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Monitor web server logs for suspicious requests targeting the vulnerable endpoints (/ _og/d/ and /og-image/). Use web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting these URIs. Educate developers on secure coding practices, especially regarding template rendering and user input handling in Vue and Nuxt.js environments. Conduct regular security assessments and penetration testing focusing on dynamic content generation features. Finally, ensure that all dependencies are kept up to date and subscribe to vulnerability advisories for timely patching.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-27T13:45:29.620Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cc3ec9e6bfc5ba1d43daab
Added to database: 3/31/2026, 9:38:17 PM
Last enriched: 3/31/2026, 9:54:04 PM
Last updated: 4/1/2026, 6:14:53 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.