Wiz Agents & Workflows are here

CVE-2025-57665
JavaScript vulnerability analysis and mitigation

Overview

Element Plus Link component (el-link) through version 2.10.6 contains a security vulnerability due to insufficient input validation for the href attribute. The component passes user-controlled href values directly to underlying anchor elements without protocol validation, URL sanitization, or security headers (NVD). This vulnerability was discovered and disclosed on September 9, 2025.

Technical details

The vulnerability stems from a security abstraction gap that obscures URL-based attack vectors. The component fails to implement proper validation or sanitization of user-controlled href values before passing them directly to anchor elements. This creates potential attack paths using dangerous protocols like javascript:, data:, or file: schemes (NVD, Element Plus Docs).

Impact

The vulnerability enables several types of attacks including cross-site scripting (XSS), phishing campaigns, and open redirect exploits that could affect applications using Element Plus Link components with user-controlled or untrusted URL inputs. While native HTML anchor elements present similar risks, UI component libraries bear additional responsibility for implementing security safeguards and providing clear risk documentation (NVD).

Mitigation and workarounds

Developers should implement URL validation and sanitization before passing values to the href attribute. A recommended approach is to validate URLs against an allowlist of safe protocols and sanitize the input. Example mitigation code has been added to the Element Plus documentation showing how to properly validate URLs using a sanitizeUrl function that checks for allowed protocols like http: and https: (Element Plus Docs, Element Plus PR).

Community reactions

The Element Plus team responded by adding explicit security warnings to their documentation and providing example code for URL validation. The changes were merged via pull request #21711, which generated significant discussion around the proper balance between security and functionality in component libraries (Element Plus PR).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-3hfp-gqgh-xc5gCRITICAL9.6
  • JavaScriptJavaScript
  • @lightdash/cli
NoYesApr 02, 2026
CVE-2026-34950CRITICAL9.1
  • JavaScriptJavaScript
  • fast-jwt
NoNoApr 02, 2026
CVE-2026-34752HIGH8.7
  • JavaScriptJavaScript
  • haraka
NoYesApr 02, 2026
CVE-2026-34825HIGH8.5
  • JavaScriptJavaScript
  • @nocobase/plugin-workflow-sql
NoYesApr 02, 2026
GHSA-ccgf-5rwj-j3hvLOW2.1
  • JavaScriptJavaScript
  • telejson
NoYesApr 02, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management