tarteaucitron.js vulnerable to DOM Clobbering via document.currentScript
Moderate severity
GitHub Reviewed
Published
Jul 3, 2025
in
AmauriC/tarteaucitron.js
•
Updated Jul 3, 2025
Description
Published to the GitHub Advisory Database
Jul 3, 2025
Reviewed
Jul 3, 2025
Published by the National Vulnerability Database
Jul 3, 2025
Last updated
Jul 3, 2025
A vulnerability was identified in tarteaucitron.js where document.currentScript was accessed without verifying that it referenced an actual
<script>
element. If an attacker injected an HTML element such as:it could clobber the document.currentScript property. This causes the script to resolve incorrectly to an
element instead of the <script> tag, leading to unexpected behavior or failure to load the script path correctly.
This issue arises because in some browser environments, named DOM elements (e.g., name="currentScript") become properties on the global document object.
Impact
An attacker with control over the HTML could exploit this to change the CDN domain of tarteaucitron.
Fix AmauriC/tarteaucitron.js@230a3b6
The issue was resolved by verifying that document.currentScript is an instance of HTMLScriptElement. If not, the script now falls back safely to the last <script> tag on the page.
References