Home

Description

Unhead is a document head and template manager. Prior to 2.1.11, useHeadSafe() can be bypassed to inject arbitrary HTML attributes, including event handlers, into SSR-rendered <head> tags. This is the composable that Nuxt docs recommend for safely handling user-generated content. The acceptDataAttrs function (safe.ts, line 16-20) allows any property key starting with data- through to the final HTML. It only checks the prefix, not whether the key contains spaces or other characters that break HTML attribute parsing. This vulnerability is fixed in 2.1.11.

PUBLISHED Reserved 2026-03-09 | Published 2026-03-12 | Updated 2026-03-13 | Assigner GitHub_M




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 2.1.11
affected

References

github.com/...unhead/security/advisories/GHSA-g5xx-pwrp-g3fv exploit

github.com/...unhead/security/advisories/GHSA-g5xx-pwrp-g3fv

cve.org (CVE-2026-31860)

nvd.nist.gov (CVE-2026-31860)

Download JSON