CVE-2024-31206
Description
dectalk-tts is a Node package to interact with the aeiou Dectalk web API. In dectalk-tts@1.0.0, network requests to the third-party API are sent over HTTP, which is unencrypted. Unencrypted traffic can be easily intercepted and modified by attackers. Anyone who uses the package could be the victim of a man-in-the-middle (MITM) attack. The network request was upgraded to HTTPS in version 1.0.1. There are no workarounds, but some precautions include not sending any sensitive information and carefully verifying the API response before saving it.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
dectalk-ttsnpm | >= 1.0.0, < 1.0.1 | 1.0.1 |
Patches
13600d8ac156fVulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- github.com/advisories/GHSA-6cf6-8hvr-r68wghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-31206ghsaADVISORY
- github.com/JstnMcBrd/dectalk-tts/blob/b3e92156cbb699218ac9b9c7d8979abd0e635767/src/index.tsnvdWEB
- github.com/JstnMcBrd/dectalk-tts/commit/3600d8ac156f27da553ac4ead46d16989a350105nvdWEB
- github.com/JstnMcBrd/dectalk-tts/issues/3nvdWEB
- github.com/JstnMcBrd/dectalk-tts/pull/4nvdWEB
- github.com/JstnMcBrd/dectalk-tts/security/advisories/GHSA-6cf6-8hvr-r68wnvdWEB
News mentions
0No linked articles in our index yet.