CVE-2024-53386
JavaScript vulnerability analysis and mitigation

Overview

Stage.js through version 0.8.10 contains a DOM Clobbering vulnerability that can lead to Cross-Site Scripting (XSS). The vulnerability exists because document.currentScript lookup can be shadowed by attacker-injected HTML elements, allowing for untrusted input that contains HTML (but does not directly contain JavaScript) to be executed (MITRE CVE).

Technical details

The vulnerability stems from the library's use of document.currentScript within the getScriptSrc function to obtain the base URL for script resources. The implementation is vulnerable to DOM Clobbering attacks where document.currentScript lookup can be shadowed by attacker-injected HTML elements through the browser's named DOM access mechanism. This allows an attacker to control the URL used for script loading, potentially enabling the loading of scripts from an attacker's server. The vulnerability has been assigned a CVSS v3.1 Base Score of 4.9 (MEDIUM) with vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N (MITRE CVE, GitHub POC).

Impact

When successfully exploited, this vulnerability can lead to cross-site scripting (XSS) attacks on web pages where scriptless attacker-controlled HTML elements are present. The impact is particularly significant for websites that allow user-controlled content to be embedded, as attackers could potentially execute arbitrary code in the context of the victim's browser session (GitHub POC).

Mitigation and workarounds

The vulnerability affects Stage.js versions through 0.8.10. Users should update to a patched version when available. In the meantime, careful validation and sanitization of user input should be implemented to prevent HTML injection that could lead to DOM Clobbering attacks (MITRE CVE).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23947CRITICAL9.3
  • JavaScriptJavaScript
  • @orval/core
NoYesJan 20, 2026
CVE-2026-23950HIGH8.8
  • JavaScriptJavaScript
  • grafana-graphite
NoYesJan 20, 2026
CVE-2026-22037HIGH8.4
  • JavaScriptJavaScript
  • @fastify/express
NoYesJan 19, 2026
CVE-2026-23522LOW3.7
  • JavaScriptJavaScript
  • @lobehub/chat
NoNoJan 19, 2026
CVE-2025-66803LOW1.7
  • JavaScriptJavaScript
  • @hotwired/turbo
NoYesJan 20, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management