Skip to content

Conversation

@tuxes3
Copy link
Contributor

@tuxes3 tuxes3 commented Sep 22, 2025

No description provided.

@tuxes3 tuxes3 self-assigned this Sep 22, 2025
@tuxes3 tuxes3 requested review from a team, ArnoEgli and rugbymauri September 22, 2025 15:43
@tuxes3 tuxes3 force-pushed the fix/186-vuln-stored-xss branch 3 times, most recently from b98cb48 to b6d483b Compare September 22, 2025 16:14
Formatters no longer treat their output as HTML safe by default. This closes a stored XSS vector where unsanitized user input could inject script content.

Existing formatters must now explicitly implement isHtmlSafe() to return true *and* ensure proper escaping/sanitization before claiming safety.

BREAKING CHANGE: Default formatter behavior changed; outputs are now considered unsafe HTML unless explicitly marked safe. Audit custom formatter implementations.
@tuxes3 tuxes3 force-pushed the fix/186-vuln-stored-xss branch from b6d483b to 4ca5087 Compare September 22, 2025 16:20
@tuxes3 tuxes3 merged commit 6afaf19 into develop Sep 23, 2025
7 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants