When the following conditions are met: - Automated CSP headers generation for SSR content is enabled - The web application serves content that can be partially controlled by external users
Then it is possible that the CSP headers generation feature might be "allow-listing" malicious injected resources like inlined JS, or references to external malicious scripts.
Available in version 1.3.0 .
Are there any links users can visit to find out more?
{
"github_reviewed_at": "2024-03-29T19:03:59Z",
"nvd_published_at": "2024-03-28T13:15:47Z",
"severity": "HIGH",
"github_reviewed": true,
"cwe_ids": [
"CWE-74"
]
}