CVE-2025-52561

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-52561
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-52561.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-52561
Aliases
  • GHSA-3mj7-qxh9-6q4p
Published
2025-06-23T21:15:26Z
Modified
2025-07-01T16:33:34.366891Z
Summary
[none]
Details

HTMLSanitizer.jl is a Whitelist-based HTML sanitizer. Prior to version 0.2.1, when adding the style tag to the whitelist, content inside the tag is incorrectly unescaped, and closing tags injected as content are interpreted as real HTML, enabling tag injection and JavaScript execution. This could result in possible cross-site scripting (XSS) in any HTML that is sanitized with this library. This issue has been patched in version 0.2.1. A workaround involves adding the math and svg elements to the whitelist manually.

References

Affected packages

Git / github.com/juliacomputing/htmlsanitizer.jl

Affected ranges

Type
GIT
Repo
https://github.com/juliacomputing/htmlsanitizer.jl
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.0
v0.1.1
v0.1.2
v0.2.0