CVE-2024-21485
JavaScript vulnerability analysis and mitigation

Overview

A Cross-site Scripting (XSS) vulnerability has been identified in multiple Dash components (CVE-2024-21485), affecting versions of dash-core-components before 2.13.0, dash before 2.15.0, and dash-html-components before 2.0.16. The vulnerability was discovered in January 2024 and patched in version 2.15.0 released on January 31, 2024. The vulnerability exists when the href attribute of anchor tags and other HTML elements can be controlled by an adversary (Snyk Advisory, GitHub Issue).

Technical details

The vulnerability occurs in several HTML components where user-controlled input in attributes like href, src, data, and formAction is not properly sanitized. This affects multiple components including dcc.Link, html.A, html.Iframe, html.ObjectEl, html.Embed, and html.Form. The CVSS v3.1 scores vary between assessments, with NVD rating it at 5.4 (Medium) and Snyk rating it at 6.5 (Medium). The vulnerability requires an authenticated user and user interaction to be exploited (NVD, Snyk Advisory).

Impact

An authenticated attacker who stores a view exploiting this vulnerability could potentially steal data visible to other users who open that view. The impact extends beyond just the visible data - attackers could make additional requests to access other data accessible to the victim user. In some cases, they could steal access tokens, allowing them to impersonate the user and access other apps and resources hosted on the same server. This vulnerability is specifically exploitable in Dash apps that include mechanisms to store user input for reloading by different users (Snyk Advisory).

Mitigation and workarounds

The vulnerability has been patched in dash v2.15.0, dash-core-components v2.13.0, and dash-html-components v2.0.16. The fix includes implementing URL sanitization for potentially dangerous attributes and adding error reporting functionality through a new _dash_error property. Users should upgrade to these versions or later to protect against this vulnerability (GitHub PR, GitHub Release).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22610HIGH8.5
  • JavaScriptJavaScript
  • angular.js
NoYesJan 10, 2026
CVE-2026-22595HIGH8.1
  • JavaScriptJavaScript
  • ghost
NoYesJan 10, 2026
CVE-2026-22594HIGH8.1
  • JavaScriptJavaScript
  • ghost
NoYesJan 10, 2026
CVE-2026-22596MEDIUM6.7
  • JavaScriptJavaScript
  • ghost
NoYesJan 10, 2026
CVE-2026-22597LOW2
  • JavaScriptJavaScript
  • ghost
NoYesJan 10, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management