From aacedba87b4e4cf642e833d83ef97bdba7198968 Mon Sep 17 00:00:00 2001 From: Vendeta Date: Sat, 16 May 2026 15:35:05 +0300 Subject: [PATCH] Improve GHSA-2f3m-j83v-344c --- .../GHSA-2f3m-j83v-344c.json | 36 ++++++++++++++----- 1 file changed, 28 insertions(+), 8 deletions(-) diff --git a/advisories/unreviewed/2026/05/GHSA-2f3m-j83v-344c/GHSA-2f3m-j83v-344c.json b/advisories/unreviewed/2026/05/GHSA-2f3m-j83v-344c/GHSA-2f3m-j83v-344c.json index d1b763726dece..b5d18defa0c2b 100644 --- a/advisories/unreviewed/2026/05/GHSA-2f3m-j83v-344c/GHSA-2f3m-j83v-344c.json +++ b/advisories/unreviewed/2026/05/GHSA-2f3m-j83v-344c/GHSA-2f3m-j83v-344c.json @@ -1,23 +1,43 @@ { "schema_version": "1.4.0", "id": "GHSA-2f3m-j83v-344c", - "modified": "2026-05-16T06:30:29Z", + "modified": "2026-05-16T06:30:40Z", "published": "2026-05-16T06:30:29Z", "aliases": [ "CVE-2026-8656" ], - "details": "Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Cross-site Scripting (XSS) via the annotated formatter due to improper sanitization of JSON values and property names. If an application compares untrusted JSON/object data and renders annotated formatter output in the DOM, attacker-controlled HTML can be interpreted by the browser, resulting in XSS.", + "summary": "Cross-site Scripting (XSS) in jsondiffpatch Annotated Formatter", + "details": "### Summary\nVersions of the package `jsondiffpatch` before 0.7.6 are vulnerable to Cross-site Scripting (XSS) when using the annotated formatter. The vulnerability occurs because the annotated formatter component does not properly escape or sanitize JSON property names and property values before interpolating them into HTML strings intended for DOM insertion.\n\n### Impact\nIf an application accepts untrusted, user-controlled JSON or object data, compares it using `jsondiffpatch`, and renders the resulting diff using the annotated formatter in a browser context, an attacker can execute arbitrary JavaScript. By crafting a JSON payload containing malicious HTML tags or attributes (e.g., `