diff --git a/advisories/unreviewed/2026/05/GHSA-2f3m-j83v-344c/GHSA-2f3m-j83v-344c.json b/advisories/unreviewed/2026/05/GHSA-2f3m-j83v-344c/GHSA-2f3m-j83v-344c.json index d1b763726dece..b5d18defa0c2b 100644 --- a/advisories/unreviewed/2026/05/GHSA-2f3m-j83v-344c/GHSA-2f3m-j83v-344c.json +++ b/advisories/unreviewed/2026/05/GHSA-2f3m-j83v-344c/GHSA-2f3m-j83v-344c.json @@ -1,23 +1,43 @@ { "schema_version": "1.4.0", "id": "GHSA-2f3m-j83v-344c", - "modified": "2026-05-16T06:30:29Z", + "modified": "2026-05-16T06:30:40Z", "published": "2026-05-16T06:30:29Z", "aliases": [ "CVE-2026-8656" ], - "details": "Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Cross-site Scripting (XSS) via the annotated formatter due to improper sanitization of JSON values and property names. If an application compares untrusted JSON/object data and renders annotated formatter output in the DOM, attacker-controlled HTML can be interpreted by the browser, resulting in XSS.", + "summary": "Cross-site Scripting (XSS) in jsondiffpatch Annotated Formatter", + "details": "### Summary\nVersions of the package `jsondiffpatch` before 0.7.6 are vulnerable to Cross-site Scripting (XSS) when using the annotated formatter. The vulnerability occurs because the annotated formatter component does not properly escape or sanitize JSON property names and property values before interpolating them into HTML strings intended for DOM insertion.\n\n### Impact\nIf an application accepts untrusted, user-controlled JSON or object data, compares it using `jsondiffpatch`, and renders the resulting diff using the annotated formatter in a browser context, an attacker can execute arbitrary JavaScript. By crafting a JSON payload containing malicious HTML tags or attributes (e.g., `