
Cloud Vulnerability DB
A community-led vulnerabilities database
Versions of the package tarteaucitronjs before 1.17.0 are vulnerable to Cross-site Scripting (XSS) via the getElemWidth() and getElemHeight() methods. The vulnerability was discovered on January 22, 2024, and was disclosed on February 9, 2025, receiving the identifier CVE-2025-1467. This vulnerability affects the tarteaucitronjs package, which provides compliance to the European cookie law (Snyk Advisory).
The vulnerability exists in the getElemWidth() and getElemHeight() methods of tarteaucitronjs, which directly use getAttribute() without proper sanitization. This is a follow-up to a previous vulnerability fixed in version 1.16.0. The fix implemented in version 1.17.0 involves modifying these methods to use the getElemAttr utility method to prevent XSS attacks (GitHub Issue, GitHub Commit).
The vulnerability allows for Cross-site Scripting (XSS) attacks, which could enable attackers to steal cookies, hijack user sessions, expose sensitive information, enable access to privileged services and functionality, and deliver malware. The attack requires active user interaction and has limited impact on integrity and confidentiality (Snyk Advisory).
Users should upgrade tarteaucitronjs to version 1.17.0 or higher, which contains the security fix. The fix involves using the getElemAttr utility method instead of direct attribute access for width and height values (Snyk Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."