Skip to content

Conversation

@melloware
Copy link
Contributor

@melloware melloware commented Dec 8, 2025

Fix #363: CVE-2025-66021

  • 6 unit tests that failed before the fix now pass
  • All existing unit tests pass (had to make some Windows fixes)
  • New code checks any element with allowTextIn to make sure it allows only tags allowed
  • Trims the tag so < script> is the same as <script>

@melloware melloware force-pushed the O363-CVE branch 4 times, most recently from 1fba743 to e3d1cc0 Compare December 8, 2025 20:54
@melloware melloware marked this pull request as ready for review December 8, 2025 20:54
@melloware
Copy link
Contributor Author

cc @ironfisto

@damianszczepanik
Copy link

@mikesamuel can you approve workflow and review this PR?

@melloware
Copy link
Contributor Author

Rebased!

Copy link
Collaborator

@kittylyst kittylyst left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I've reviewed this as best I can without having full context on the project, and I concur that getting this out there sooner rather than later is better.

I'm +1 to merge and release.

Copy link

@damianszczepanik damianszczepanik left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Repository owner has to agree to start building this PR

@kittylyst
Copy link
Collaborator

Approve the builds to run - let's see what happens

@melloware
Copy link
Contributor Author

Looks like it all passed and built!

@krzysztof-osiecki
Copy link

sorry for being annoing with @ but is there any info about the progress of this?

looks like we are waiting for @jmanico and @erikcostlow review but as i understand from here #363 that they no longer maintain this project and now its on @aalmiray to release this?

@aalmiray
Copy link
Collaborator

I'm the one that has upgraded the build for posting releases, yes. But I do not posses the domain knowledge required to asses if code patches are suitable for fixes, specially for a CVE. Which is why I'm waiting for someone else to clear that out.

@krzysztof-osiecki
Copy link

That's perfectly reasonable and that someone else would be one of the guys I mentioned in my previous comment?

@melloware
Copy link
Contributor Author

I have taken this PR as far as it can go. Unit tests proving the issue, then iterating and fixing the code until the broken unit tests pass. Introduced new unit tests when scenario;s like < script> were presented and fixed.

@kittylyst
Copy link
Collaborator

Thanks to everyone who has contributed to this PR.

As the new maintainers are still levelling up, and are operating at best efforts, then I think we're as sure as we can be.

I propose we give it 24 hours and if no-one complains, then @aalmiray should do a release. Any objections to that plan?

@aalmiray
Copy link
Collaborator

NYE's gift? 😅

The first release under the new scheme is good to go, although I think further updates may be needed as the project's version does not follow semver, a manual step is needed for now.

This being said, JReleaser supports other versioning options. These updates can be applied later.

@melloware
Copy link
Contributor Author

+1 on this idea!

@jmanico
Copy link
Member

jmanico commented Dec 30, 2025

looks like we are waiting for @jmanico and @erikcostlow review but as i understand from here #363 that they no longer maintain this project and now its on @aalmiray to release this?

Yes that is fair. I think this is a good plan if the rest of the team supports it.

@jmanico jmanico merged commit 40718ac into OWASP:main Dec 30, 2025
3 checks passed
@jmanico
Copy link
Member

jmanico commented Dec 30, 2025

At the very least I merged the PR into main. I'll leave it to others to decide on when to release.

@melloware melloware deleted the O363-CVE branch December 31, 2025 15:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Vulnerabilities: CVE-2025-66021

9 participants