Skip to content

Fix/186 vuln stored xss#82

Merged
tuxes3 merged 4 commits intodevelopfrom
fix/186-vuln-stored-xss
Sep 23, 2025
Merged

Fix/186 vuln stored xss#82
tuxes3 merged 4 commits intodevelopfrom
fix/186-vuln-stored-xss

Conversation

@tuxes3
Copy link
Contributor

@tuxes3 tuxes3 commented Sep 22, 2025

No description provided.

@tuxes3 tuxes3 self-assigned this Sep 22, 2025
@tuxes3 tuxes3 force-pushed the fix/186-vuln-stored-xss branch 2 times, most recently from 3a76820 to 4ae3eae Compare September 22, 2025 17:04
Formatters no longer treat their output as HTML safe by default. This closes a stored XSS vector where unsanitized user input could inject script content.

Existing formatters must now explicitly implement isHtmlSafe() to return true *and* ensure proper escaping/sanitization before claiming safety.

BREAKING CHANGE: Default formatter behavior changed; outputs are now considered unsafe HTML unless explicitly marked safe. Audit custom formatter implementations.
@tuxes3 tuxes3 force-pushed the fix/186-vuln-stored-xss branch from 4ae3eae to ca3d310 Compare September 23, 2025 19:41
@tuxes3 tuxes3 merged commit e00cd81 into develop Sep 23, 2025
7 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant