Cross-site Scripting (XSS) Affecting gjs package, versions *


Severity

Recommended
0.0
medium
0
10

Based on CentOS security rating.

Threat Intelligence

EPSS
0.05% (16th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CENTOS9-GJS-15689481
  • published19 Mar 2026
  • disclosed13 Mar 2026

Introduced: 13 Mar 2026

NewCVE-2026-32635  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

There is no fixed version for Centos:9 gjs.

NVD Description

Note: Versions mentioned in the description apply only to the upstream gjs package and not the gjs package as distributed by Centos. See How to fix? for Centos:9 relevant fixed versions and status.

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 22.0.0-next.3, 21.2.4, 20.3.18, and 19.2.20, a Cross-Site Scripting (XSS) vulnerability has been identified in the Angular runtime and compiler. It occurs when the application uses a security-sensitive attribute (for example href on an anchor tag) together with Angular's ability to internationalize attributes. Enabling internationalization for the sensitive attribute by adding i18n-<attribute> name bypasses Angular's built-in sanitization mechanism, which when combined with a data binding to untrusted user-generated data can allow an attacker to inject a malicious script. This vulnerability is fixed in 22.0.0-next.3, 21.2.4, 20.3.18, and 19.2.20.

CVSS Base Scores

version 3.1