Skip to content

[Snyk] Security upgrade com.googlecode.owasp-java-html-sanitizer:owasp-java-html-sanitizer from 20240325.1 to 20260101.1#535

Open
ISGA wants to merge 1 commit intomainfrom
snyk-fix-43fa1b289674be138db302010fca5308
Open

[Snyk] Security upgrade com.googlecode.owasp-java-html-sanitizer:owasp-java-html-sanitizer from 20240325.1 to 20260101.1#535
ISGA wants to merge 1 commit intomainfrom
snyk-fix-43fa1b289674be138db302010fca5308

Conversation

@ISGA
Copy link
Copy Markdown
Owner

@ISGA ISGA commented Jan 13, 2026

User description

snyk-top-banner

Snyk has created this PR to fix 1 vulnerabilities in the maven dependencies of this project.

Snyk changed the following file(s):

  • pom.xml

Vulnerabilities that will be fixed with an upgrade:

Issue Score Upgrade
high severity Cross-site Scripting (XSS)
SNYK-JAVA-COMGOOGLECODEOWASPJAVAHTMLSANITIZER-14114938
  275   com.googlecode.owasp-java-html-sanitizer:owasp-java-html-sanitizer:
20240325.1 -> 20260101.1
Major version upgrade Proof of Concept

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Cross-site Scripting (XSS)


CodeAnt-AI Description

Upgrade HTML sanitizer to remove a high-severity XSS vulnerability

What Changed

  • Replaced the bundled OWASP Java HTML Sanitizer version 20240325.1 with 20260101.1, addressing a reported Cross-site Scripting (XSS) vulnerability
  • Minor cleanup in the project descriptor: changed the contributors element to a self-closing tag (no behavior change)

Impact

✅ Prevents a known XSS exploit via the HTML sanitizer
✅ Fixes a high-severity security finding in dependency scans
✅ Fewer security alerts from automated dependency checks

💡 Usage Guide

Checking Your Pull Request

Every time you make a pull request, our system automatically looks through it. We check for security issues, mistakes in how you're setting up your infrastructure, and common code problems. We do this to make sure your changes are solid and won't cause any trouble later.

Talking to CodeAnt AI

Got a question or need a hand with something in your pull request? You can easily get in touch with CodeAnt AI right here. Just type the following in a comment on your pull request, and replace "Your question here" with whatever you want to ask:

@codeant-ai ask: Your question here

This lets you have a chat with CodeAnt AI about your pull request, making it easier to understand and improve your code.

Example

@codeant-ai ask: Can you suggest a safer alternative to storing this secret?

Preserve Org Learnings with CodeAnt

You can record team preferences so CodeAnt AI applies them in future reviews. Reply directly to the specific CodeAnt AI suggestion (in the same thread) and replace "Your feedback here" with your input:

@codeant-ai: Your feedback here

This helps CodeAnt AI learn and adapt to your team's coding style and standards.

Example

@codeant-ai: Do not flag unused imports.

Retrigger review

Ask CodeAnt AI to review the PR again, by typing:

@codeant-ai: review

Check Your Repository Health

To analyze the health of your code repository, visit our dashboard at https://app.codeant.ai. This tool helps you identify potential issues and areas for improvement in your codebase, ensuring your repository maintains high standards of code health.

@codeant-ai
Copy link
Copy Markdown
Contributor

codeant-ai bot commented Jan 13, 2026

CodeAnt AI is reviewing your PR.


Thanks for using CodeAnt! 🎉

We're free for open-source projects. if you're enjoying it, help us grow by sharing.

Share on X ·
Reddit ·
LinkedIn

@amplify-security
Copy link
Copy Markdown
Contributor

🔍 Amplify code check status:   status looks good

⚠️ 0 issues detected in   📄 1 file and   ❇️ 4 lines of code   🛠️ using Opengrep

Last updated by commit 72e3db0 at 2026-01-13 09:31:53 UTC.

@codeant-ai codeant-ai bot added the size:XS This PR changes 0-9 lines, ignoring generated files label Jan 13, 2026
@codeant-ai
Copy link
Copy Markdown
Contributor

codeant-ai bot commented Jan 13, 2026

Sequence Diagram

The PR updates the owasp-java-html-sanitizer Maven property to a newer version to remediate an XSS vulnerability. The diagram shows the high-level flow from the PR change through dependency resolution to the application using the upgraded sanitizer at runtime.

sequenceDiagram
    participant SnykPR as Snyk Pull Request
    participant Repo as Repository (pom.xml)
    participant CI as CI / Maven
    participant App as Application
    participant Sanitizer as OWASP HTML Sanitizer

    SnykPR->>Repo: Update owasp.html.sanitizer.version in pom.xml
    Repo-->>CI: Merge / trigger build
    CI->>Sanitizer: Resolve dependency version 20260101.1
    Sanitizer-->>CI: Provide updated library
    CI->>App: Build with upgraded sanitizer
    App->>Sanitizer: Use sanitizer for HTML input processing (runtime)
    Sanitizer-->>App: Sanitized output (XSS vulnerability mitigated)
Loading

Generated by CodeAnt AI

@codeant-ai
Copy link
Copy Markdown
Contributor

codeant-ai bot commented Jan 13, 2026

Nitpicks 🔍

🔒 No security issues identified
⚡ Recommended areas for review

  • Major dependency upgrade
    The owasp-html-sanitizer property was bumped to a newer major snapshot/release. Major upgrades can change runtime behaviour and APIs; verify compatibility (sanitization rules, configuration APIs) and run the full test suite and integration tests to avoid regressions or breaking behavior in places that rely on sanitizer semantics.

@codeant-ai
Copy link
Copy Markdown
Contributor

codeant-ai bot commented Jan 13, 2026

CodeAnt AI finished reviewing your PR.

@zeropath-ai
Copy link
Copy Markdown

zeropath-ai bot commented Jan 13, 2026

No security or compliance issues detected. Reviewed everything up to 72e3db0.

Security Overview
Detected Code Changes
Change Type Relevant files
Configuration changes ► pom.xml
    Update owasp.html.sanitizer.version to 20260101.1
    Change contributors to empty tag

@openhands-ai
Copy link
Copy Markdown

openhands-ai bot commented Jan 13, 2026

Looks like there are a few issues preventing this PR from being merged!

  • GitHub Actions are failing:
    • Keycloak Operator CI
    • Keycloak CI
    • Keycloak Operator CI
    • Automatic Dependency Submission (Maven)
    • Keycloak Documentation
    • CodeQL
    • Keycloak JavaScript CI
    • Keycloak CI

If you'd like me to help, just leave a comment, like

@OpenHands please fix the failing actions on PR #535 at branch `snyk-fix-43fa1b289674be138db302010fca5308`

Feel free to include any additional details that might help me get this PR into a better state.

You can manage your notification settings

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

size:XS This PR changes 0-9 lines, ignoring generated files

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants