Skip to content

[GHSA-rpr9-rxv7-x643] Apostrophe has default XSS via xmp raw-text passthrough in sanitize-html#7699

Open
AND-TomHarris wants to merge 1 commit into
AND-TomHarris/advisory-improvement-7699from
AND-TomHarris-GHSA-rpr9-rxv7-x643
Open

[GHSA-rpr9-rxv7-x643] Apostrophe has default XSS via xmp raw-text passthrough in sanitize-html#7699
AND-TomHarris wants to merge 1 commit into
AND-TomHarris/advisory-improvement-7699from
AND-TomHarris-GHSA-rpr9-rxv7-x643

Conversation

@AND-TomHarris
Copy link
Copy Markdown

Updates

  • Affected products

Comments
As noted here: apostrophecms/apostrophe#5418

The vulnerability was introduced in version 2.17.3 (not prior versions). 2.17.4 has been published to revert the changes: https://www.npmjs.com/package/sanitize-html?activeTab=versions

@github
Copy link
Copy Markdown
Collaborator

github commented May 15, 2026

Hi there @boutell! A community member has suggested an improvement to your security advisory. If approved, this change will affect the global advisory listed at github.com/advisories. It will not affect the version listed in your project repository.

This change will be reviewed by our Security Curation Team. If you have thoughts or feedback, please share them in a comment here! If this PR has already been closed, you can start a new community contribution for this advisory

@github-actions github-actions Bot changed the base branch from main to AND-TomHarris/advisory-improvement-7699 May 15, 2026 14:06
Copy link
Copy Markdown

@Dipanshusinghh Dipanshusinghh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This change looks much more accurate based on the reproduction/testing shared in the related discussion.

Updating the affected range from <=2.17.3 to specifically 2.17.3 should help avoid confusion for users trying to verify whether older versions are actually vulnerable or not.

Also nice to see the fixed version explicitly marked as 2.17.4 here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants