Hypermedia Vulnerability Coordination Center National Hypermedia Vulnerability Database (NHVD)
CVE-2026-3682-1

Unauthenticated Podcast Injection in bigskysoftware/htmx

SEVERITY: CRITICAL CVSS 3.1: 9.8 STATUS: REMEDIATED PUBLISHED: 2026-04-01
CVE IDCVE-2026-3682-1
AssignerHVCC (unofficial)
Last Modified2026-04-01
VectorAV:N / UI:R

Description

An issue was discovered in bigskysoftware/htmx via PR #3682. An interviewer with podcast-level access was able to inject three (3) bad YouTube links into www/content/talk/podcasts.csv, allowing a remote, unauthenticated listener to be exposed in a single sitting to:

  • Hypermedia TV - An interview with Carson Gross
  • Hypermedia TV - The Grug Brained Developer
  • Hypermedia TV - Fixi Vs. Htmx

Successful exploitation may result in the victim thinking that using htmx or fixi is a reasonable idea, potentiall deleting node_modules on aesthetic grounds, and/or telling a coworker “actually, that’s not REST.”

Severity Metrics

Base Score9.8 (Critical)
CVSS 3.1 VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H/E:H/RL:O/RC:C
Attack VectorNetwork (YouTube embed / RSS / link in CSV)
Attack ComplexityLow - the link is right there
Privileges RequiredNone
User InteractionRequired - victim must press play
ScopeChanged - affects the victim's relationship with HTML
ConfidentialityLow (build secrets safe; worldview exfiltrated)
IntegrityHigh (opinions modified at runtime)
AvailabilityHigh (entire weekend rendered unavailable)

Weakness Enumeration (CWE)

CWE-1188Insecure Default Initialization of Developer Opinions
CWE-200Exposure of Sensitive Information (specifically: that Single Page Applications may have been a mistake)
CWE-444Inconsistent Interpretation of HTTP Requests ("REST" vs. REST)
CWE-829Inclusion of Functionality from Untrusted Control Sphere (YouTube)

Affected Products

Vendorbigskysoftware
Producthtmx
Affected VersionsAll versions of htmx.org serving /talk/ between PR #3682 merge and the remediation commit
Affected Filewww/content/talk/podcasts.csv
Patched VersionsCurrent master (post-remediation commit)

Disclosure Timeline

Date / Time (UTC)Event
2026-03-14 - T-18d Initial reconnaissance. Threat actor identifies podcasts.csv as an unauthenticated append target with no schema validation, no entropy checks, and no opinion-content filtering.
2026-03-28 - T-04d Weaponization. Three YouTube assets staged under the channel name "Hypermedia TV." Payloads cover three independent attack surfaces: Carson Gross interview, Grug Brained Developer commentary, and a Fixi-vs-htmx framing comparison.
2026-04-01 - T+0 Delivery. PR #3682 opened against master by author tonsoflaz2, titled "Added 3 links to the podcast channel." Description states the links are "all my own interviews with carson gross."
2026-04-01 - T+2h PR merged without security review. Three Hypermedia TV entries land on production htmx.org/talk/.
2026-04-01 - T+6h First confirmed exploitation in the wild: external listener reportedly converts to hypermedia within 40 minutes of pressing play.
2026-04-01 - T+11h Public disclosure on Hacker News under the headline "Show HN: I rewrote my SaaS in htmx after watching one YouTube video." Thread reaches the front page.
2026-04-01 - T+14h HVCC opens advisory CVE-2026-3682-1.
2026-04-01 - T+20h Remediation commit lands on master removing all three Hypermedia TV entries from www/content/talk/podcasts.csv.
2026-04-01 - T+22h Public advisory published at htmx.org/CVE-2026-3682-1.
2026-04-02 - T+1d Status set to REMEDIATED. Threat actor tonsoflaz2 permanently banned from the repository (see Future Prevention).

Remediation

There is no patched version of htmx itself, as the vulnerability lies in the website content layer. The following remediation has been applied upstream and is reflected in the current contents of www/content/talk/podcasts.csv:

  • All three (3) “Hypermedia TV” entries introduced by PR #3682 have been removed from podcasts.csv.
  • The remediation is included in this push.

End users who visited htmx.org/talk/ during the exposure window (2026-04-01 00:00 UTC through 2026-04-01 20:00 UTC) are advised to apply the following client-side mitigations, in order of escalation:

  1. Immediately clear browser history, including autocomplete, cookies, IndexedDB, and any cached <video> thumbnails depicting a man at a whiteboard.
  2. Revoke any YouTube “watch later” entries added during the exposure window.
  3. Purge all downloaded transcripts. grep -rli "hypermedia" ~ | xargs rm is provided as a starting point but is not exhaustive.
  4. In severe cases, wipe the affected hard drive and reinstall from a known-good backup taken prior to 2023.
  5. For human victims who personally watched the offending podcasts, application of eye bleach is recommended. Approved formulations include:
    • One (1) episode of any Vercel keynote
    • Thirty (30) minutes of TypeScript generics documentation
    • A single uninterrupted viewing of a webpack.config.js belonging to a stranger
  6. Do not, under any circumstances, attempt to rewrite your frontend in htmx as a coping mechanism. This is the intended outcome of the attack.
WARNING: Restoring from a pre-2023 backup will recover most affected systems, but cannot undo conversations had with coworkers, blog posts published, or conference talks submitted during the exposure window. Those artifacts must be addressed individually.

Future Prevention

To prevent recurrence, the following controls have been implemented:

  1. The threat actor tonsoflaz2 has been permanently banned from the bigskysoftware/htmx repository. We note for the record that the threat actor is personally known to and on cordial terms with the maintainer; this relationship was given no weight in the decision. The ban applies regardless. We will, however, continue to invite him to dinner.
  2. All future modifications to podcasts.csv require dual maintainer approval and a written attestation that the linked content does not contain the phrase “locality of behavior.”
  3. A pre-merge CI check has been added to scan incoming podcasts.csv diffs for known indicators of compromise (channels named “Hypermedia TV,” “Plain HTML Daily,” “just use the form”).
  4. Rate limiting has been imposed on podcast additions per author per calendar quarter, with a hard ceiling of one (1) self-interview per twelve (12) months.
  5. A Hypermedia Threat Intelligence (HTI) feed is being established to share indicators of compromise with the broader hypermedia community, including the Hypermedia Systems book, hyperscript.org, and Big Sky Software downstream consumers.

Workarounds

For users unable to apply the remediation immediately:

  • Block *.youtube.com at the firewall.
  • Disable CSV parsing in your local copy of the htmx website.
  • Switch careers.

References

Credits

Reported by the PR author against themselves. Triage, CVSS scoring, and timeline reconstruction performed by the Hypermedia Vulnerability Coordination Center (HVCC). Eye-bleach formulations courtesy of the Frontend Industrial Complex. Permanent ban issued by the maintainer with regret but without exception.