Home

Description

locize is a localization platform that connects code and i18n setup. Prior to version 4.0.21, the locize client SDK registers a window.addEventListener("message", …) handler that dispatches to registered internal handlers (editKey, commitKey, commitKeys, isLocizeEnabled, requestInitialize, …) without validating event.origin. The pre-patch listener in src/api/postMessage.js gates dispatch on event.data.sender === "i18next-editor-frame" — that value sits inside the attacker-controlled message payload, not the browser-enforced origin. Any web page that could embed or be embedded by a locize-enabled host — an iframe on a third-party page, a window.open-ed victim, a parent frame reaching down — could send a crafted postMessage and trigger the internal handlers. This issue has been patched in version 4.0.21.

PUBLISHED Reserved 2026-04-22 | Published 2026-05-08 | Updated 2026-05-08 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-346: Origin Validation Error

Product status

< 4.0.21
affected

References

github.com/...locize/security/advisories/GHSA-w937-fg2h-xhq2

github.com/locize/locize/releases/tag/v4.0.21

cve.org (CVE-2026-41886)

nvd.nist.gov (CVE-2026-41886)

Download JSON