CVE-2026-43897
Link Preview JS IPv6 Loopback and DNS Spoofing Vulnerabilities
Publication date: 2026-05-11
Last updated on: 2026-05-11
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability exists in the Link Preview JS library prior to version 4.0.1. The library extracts information from web links but did not properly check for IPv6 loopback attacks. Additionally, there was a DNS attack vulnerability where an address could be resolved into an internal IP address. These issues could lead to internal data leaks.
How can this vulnerability impact me? :
This vulnerability can lead to internal data leaks by allowing attackers to exploit IPv6 loopback and DNS resolution attacks. This means that sensitive internal network information could be exposed to unauthorized parties, potentially compromising the security of internal systems.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, upgrade the Link Preview JS library to version 4.0.1 or later, as this version includes fixes for the IPv6 loopback and DNS attacks that could cause internal data leaks.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in Link Preview JS prior to version 4.0.1 could lead to internal data leaks due to IPv6 loopback and DNS attacks resolving addresses into internal IPs.
Such internal data leaks may impact compliance with data protection regulations like GDPR and HIPAA, which require safeguarding sensitive and internal information from unauthorized disclosure.
However, specific details on compliance impact or mitigation steps related to these standards are not provided in the available information.