When the following conditions are met: - Automated CSP headers generation for SSR content is enabled - The web application serves content that can be partially controlled by external users
Then it is possible that the CSP headers generation feature might be "allow-listing" malicious injected resources like inlined JS, or references to external malicious scripts.
Available in version 1.3.0 .
Are there any links users can visit to find out more?
{ "nvd_published_at": "2024-03-28T13:15:47Z", "cwe_ids": [ "CWE-74" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-03-29T19:03:59Z" }