Vulnerability Details
- File Path:
orbit-app/src/components/CommentsSection.jsx
- Vulnerability Type: Cross-Site Scripting (XSS)
- Risk Level: High
Explanation:
The code directly assigns user-controlled input (e.target.value) to a function (setComment) without any sanitization or validation. If this input is later rendered in the DOM without proper escaping, it could lead to a Cross-Site Scripting (XSS) vulnerability.
Please investigate and resolve this issue to maintain code security and quality.