Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
26 changes: 26 additions & 0 deletions vulnerabilities/AIKIDO-2026-10303.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
{
"package_name": "@atomicfi/transact-javascript",
"patch_versions": [
"3.0.11"
],
"vulnerable_ranges": [
[
"3.0.10",
"3.0.10"
]
],
"cwe": [
"CWE-20"
],
"tldr": "Affected versions of this package allowed unvalidated user-controlled URLs to be passed directly to `window.open`, enabling arbitrary schemes such as `javascript:` or `data:` to be executed in a new browser context. This could allow an attacker to craft a malicious `payload.url` that executes JavaScript or redirects users to phishing pages when the link is opened. By injecting a specially crafted URL into the event handler, an attacker could trigger client-side script execution or malicious navigation. The patch mitigates this by parsing the URL and restricting navigation strictly to the `https:` protocol.",
"doest_this_affect_me": "You are affected if you are using a version that falls within the vulnerable range.",
"how_to_fix": "Upgrade the `@atomicfi/transact-javascript` library to the patch version.",
"vulnerable_to": "Improper Input Validation",
"related_cve_id": "",
"language": "JS",
"severity_class": "MEDIUM",
"aikido_score": 48,
"changelog": "https://github.com/atomicfi/atomic-transact-javascript/releases/tag/3.0.11",
"last_modified": "2026-03-06",
"published": "2026-03-06"
}