Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-25225

Опубликовано: 08 сент. 2025
Источник: debian

Описание

`sanitize-html` prior to version 2.0.0-beta is vulnerable to Cross-site Scripting (XSS). The `sanitizeHtml()` function in `index.js` does not sanitize content when using the custom `transformTags` option, which is intended to convert attribute values into text. As a result, malicious input can be transformed into executable code.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
node-sanitize-htmlnot-affectedpackage

Примечания

  • https://github.com/apostrophecms/sanitize-html/issues/293

  • https://github.com/apostrophecms/sanitize-html/pull/156

  • https://github.com/apostrophecms/sanitize-html/commit/712cb6895825c8bb6ede71a16b42bade42abcaf3 (2.0.0)

Связанные уязвимости

CVSS3: 6.1
ubuntu
5 месяцев назад

`sanitize-html` prior to version 2.0.0-beta is vulnerable to Cross-site Scripting (XSS). The `sanitizeHtml()` function in `index.js` does not sanitize content when using the custom `transformTags` option, which is intended to convert attribute values into text. As a result, malicious input can be transformed into executable code.

CVSS3: 6.1
redhat
5 месяцев назад

`sanitize-html` prior to version 2.0.0-beta is vulnerable to Cross-site Scripting (XSS). The `sanitizeHtml()` function in `index.js` does not sanitize content when using the custom `transformTags` option, which is intended to convert attribute values into text. As a result, malicious input can be transformed into executable code.

CVSS3: 6.1
nvd
5 месяцев назад

`sanitize-html` prior to version 2.0.0-beta is vulnerable to Cross-site Scripting (XSS). The `sanitizeHtml()` function in `index.js` does not sanitize content when using the custom `transformTags` option, which is intended to convert attribute values into text. As a result, malicious input can be transformed into executable code.

CVSS3: 6.1
github
5 месяцев назад

sanitize-html is vulnerable to XSS through incomprehensive sanitization