CVE-2024-43799
JavaScript vulnerability analysis and mitigation

Overview

CVE-2024-43799 affects the Send library, which is used for streaming files from the file system as an HTTP response. The vulnerability was discovered and disclosed on September 10, 2024, affecting all versions of Send prior to 0.19.0. The issue involves untrusted user input being passed to SendStream.redirect() which can lead to code execution (GitHub Advisory, NVD).

Technical details

The vulnerability stems from a template injection issue that can potentially lead to XSS (Cross-Site Scripting). The CVSS v3.1 base score is 4.7 (Medium) according to NVD, with a vector string of CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N. GitHub's assessment gives it a slightly different score of 5.0 (Medium) with vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L (NVD, GitHub Advisory).

Impact

The vulnerability allows an attacker to execute untrusted code through template injection, potentially leading to Cross-Site Scripting (XSS) attacks. The impact requires specific conditions to be met, including attacker control of the input to response.redirect(), Express not redirecting before the template appears, and user interaction in the form of clicking a link in the template (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Send version 0.19.0. For users unable to upgrade immediately, a workaround is available by ensuring any untrusted inputs are properly validated, ideally using an explicit allowlist. It is strongly recommended to upgrade to the patched version (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55182CRITICAL10
  • JavaScriptJavaScript
  • react
NoYesDec 03, 2025
CVE-2025-66401CRITICAL9.8
  • JavaScriptJavaScript
  • mcp-watch
NoNoDec 01, 2025
CVE-2025-66412HIGH8.5
  • JavaScriptJavaScript
  • @angular/compiler
NoYesDec 01, 2025
CVE-2025-66415MEDIUM6.9
  • JavaScriptJavaScript
  • @fastify/reply-from
NoYesDec 01, 2025
CVE-2025-66405MEDIUM6.9
  • JavaScriptJavaScript
  • @portkey-ai/gateway
NoYesDec 01, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management