| प्लगइन का नाम | @nuxt/nitro-server |
|---|---|
| कमजोरियों का प्रकार | क्रॉस-साइट स्क्रिप्टिंग (XSS) |
| CVE संख्या | CVE-2026-46342 |
| तात्कालिकता | कम |
| CVE प्रकाशन तिथि | 2026-05-20 |
| स्रोत URL | CVE-2026-46342 |
Nuxt Nitro ‘__nuxt_island’ Shared-Cache Poisoning (CVE-2026-46342) — What WordPress Site Owners Need to Know
सारांश: A recently disclosed vulnerability in the Nuxt Nitro server impacts versions ≥ 4.2.0 and ≤ 4.4.5. It can lead to shared-cache poisoning and Cross-Site Scripting (XSS) via the __nuxt_island endpoint. The issue is patched in 4.4.6. If your WordPress site integrates with JavaScript front-ends, headless architectures, CDN edge rendering, or uses Nuxt/Nitro components in your toolchain, this advisory explains the risk, detection methods, mitigations (including emergency firewall/edge rules), and longer-term supply-chain hardening strategies.
यह वर्डप्रेस साइट के मालिकों के लिए क्यों महत्वपूर्ण है
Most WordPress deployments remain PHP-based with server-side rendering from the WordPress stack. Increasingly, however, operators in Hong Kong and the region are using modern JavaScript front-ends (Nuxt, Next, Remix) for performance and improved developer workflows — a headless or decoupled architecture. Those front-ends commonly rely on Node-based servers, Nitro middleware, and edge caches/CDNs.
The reported issue (CVE-2026-46342) affects a Nitro server endpoint used by Nuxt front-ends: __nuxt_island. When responses are not tightly bound to the originating request properties, a shared cache can serve a response created for one user to another. If that response contains attacker-controlled content (for example, unsanitized HTML or script fragments), an attacker can poison caches and trigger Cross-Site Scripting for many site visitors.
Even if your WordPress backend is not directly running Node, WordPress systems can be impacted when:
- Your WordPress site uses a Nuxt or Nitro front-end that pulls data from the WordPress REST API or GraphQL.
- Your hosting environment uses server-side rendering or edge-rendering services that include Nitro-based components.
- Your CI/CD, build pipeline, or third-party services use the vulnerable package to generate previews, deploy front-ends, or render pages at the edge.
This advisory takes a pragmatic stance with a Hong Kong security expert tone: direct, operational, and focused on what site owners and operators must do now.
Technical overview — what’s broken
- द
__nuxt_islandendpoint renders or hydrates islanded components (small interactive fragments) in Nuxt’s hybrid rendering model. - The vulnerable behavior: responses from the endpoint are not sufficiently bound to request properties (origin, headers, cookies, query parameters). If a caching layer stores that response without appropriate Vary/Cache-Control headers or cache keys, the cached response may be served to other requests that differ in critical request properties.
- If an attacker can craft a request that includes attacker-controlled content (e.g., via injected properties or reflected data) and cause that response to be cached, the attacker can poison the shared cache. When other users receive that cached response, any malicious script will execute in their browsers — resulting in potentially widespread impact.
The end result: a single successful exploit can turn into mass XSS via one poisoned cached island fragment.
Attack surface for WordPress sites
Common integration patterns that expose WordPress-powered sites to this issue:
- Headless WordPress + Nuxt front-end:
- WordPress serves content via REST API / GraphQL.
- Nuxt front-end uses Nitro to server-render islands that include content from WP.
- Vulnerable Nitro package used in the front-end process can cause cache poisoning.
- Edge rendering / CDN preview/OG image generation:
- Some edge preview generators or image endpoints include Nitro-based rendering.
- If your hosting provider or CI uses Nitro components, those endpoints may be affected.
- Developer tooling:
- Build and preview systems (storybook, SSR previews, static site generators) that install the vulnerable dependency can create or upload poisoned artifacts or cached output.
- तृतीय-पक्ष एकीकरण:
- Plugin vendors, theme builders, or headless-service providers could be running Nitro-based previews. If they are using vulnerable versions, clients’ sites may be impacted indirectly.
If your WordPress site is purely classic (no headless front-end, no Node tooling in deployments), the risk is much lower. But in modern DevOps environments it’s worth checking.
How attackers can exploit it (practical scenarios)
- Reflected XSS via cached island fragment:
- Attacker sends a crafted request to
__nuxt_islandwith attacker-controlled parameter. - Nitro generates a fragment containing the parameter without appropriate sanitization.
- The CDN caches the fragment for a shared key.
- Subsequent visitors receive the cached fragment; attacker JavaScript runs in their browsers.
- Attacker sends a crafted request to
- Stored-like poisoning via upstream data:
- If the front-end renders data from a third-party API or user input (e.g., comments), an attacker stores malicious input upstream.
- The server renders the island with the malicious content; the response is cached and later served to others.
- Large-scale abuse: Edge caches mean a single cached object can affect thousands of visitors; cache-poisoning routes amplify impact.
Patch and update — the single most important fix
If you use Nuxt/Nitro anywhere in your stack, update the affected package immediately:
- प्रभावित:
@nuxt/nitro-server≥ 4.2.0 and ≤ 4.4.5 - पैच किया गया: 4.4.6 — upgrade to 4.4.6 or later
क्रियाएँ:
- For projects that use npm/yarn/pnpm:
- Run
npm install @nuxt/nitro-server@^4.4.6(or updatepackage.jsonand run your package manager). - Update lockfiles (
package-lock.json,yarn.lock,pnpm-lock.yaml) and commit them.
- Run
- For containerized builds:
- Rebuild images and redeploy after updating the package and lockfile.
- Avoid relying on implicit latest versions — use pinned versions and rebuild images frequently.
- For edge or preview services you don’t control:
- Contact your provider or service owner and request confirmation of patching.
- Ask them to update to 4.4.6+ and to invalidate caches after patching.
यदि आप तुरंत अपडेट नहीं कर सकते हैं, तो नीचे दिए गए शमन उपायों को लागू करें।.
Immediate mitigations you can apply now (even before patching)
Practical measures you can implement quickly to reduce exposure:
- Disable shared caching for the island endpoint
- Ensure responses from
__nuxt_islandare marked not cacheable by shared caches:- सेट
Cache-Control: private, no-cache, no-store, must-revalidate(choose appropriate directives for your environment). - जोड़ें
Varyheaders to include cookies/authorization/host if responses depend on them:Vary: Cookie, Authorization, Accept-Encoding, Host.
- सेट
- If you control CDN rules, create a rule to bypass cache for any path matching
/__nuxt_islandया समान।.
- Ensure responses from
- Virtual patching with WAF / edge rules