CVE-2025-57665

Element Plus Link component (el-link) through 2.10.6 implements insufficient input validation for the href attribute, creating a security abstraction gap that obscures URL-based attack vectors. The component passes user-controlled href values directly to underlying anchor elements without protocol validation, URL sanitization, or security headers. This allows attackers to inject malicious URLs using dangerous protocols (javascript:, data:, file:) or redirect users to external malicious sites. While native HTML anchor elements present similar risks, UI component libraries bear additional responsibility for implementing security safeguards and providing clear risk documentation. The vulnerability enables XSS attacks, phishing campaigns, and open redirect exploits affecting applications that use Element Plus Link components with user-controlled or untrusted URL inputs.
Configurations

No configuration.

History

22 Sep 2025, 16:15

Type Values Removed Values Added
CWE CWE-79
CWE-601
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.4

09 Sep 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-09 18:15

Updated : 2025-09-22 16:15


NVD link : CVE-2025-57665

Mitre link : CVE-2025-57665

CVE.ORG link : CVE-2025-57665


JSON object : View

Products Affected

No product.

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-601

URL Redirection to Untrusted Site ('Open Redirect')