CVE-2023-22461

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-22461
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-22461.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-22461
Aliases
Published
2023-01-04T14:57:04.902Z
Modified
2025-11-29T13:53:25.652751Z
Severity
  • 7.6 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N CVSS Calculator
Summary
sanitize-svg Filter Bypass Allows Cross-Site Scripting (XSS)
Details

The sanitize-svg package, a small SVG sanitizer to prevent cross-site scripting attacks, uses a deny-list-pattern to sanitize SVGs to prevent XSS. In doing so, literal <script>-tags and on-event handlers were detected in versions prior to 0.4.0. As a result, downstream software that relies on sanitize-svg and expects resulting SVGs to be safe, may be vulnerable to cross-site scripting. This vulnerability was addressed in v0.4.0. There are no known workarounds

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-79",
        "CWE-80"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/22xxx/CVE-2023-22461.json"
}
References

Affected packages

Git / github.com/mattkrick/sanitize-svg

Affected ranges

Type
GIT
Repo
https://github.com/mattkrick/sanitize-svg
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.2.1