Skip to content

Conversation

@tuxes3
Copy link
Contributor

@tuxes3 tuxes3 commented Sep 22, 2025

No description provided.

@tuxes3 tuxes3 self-assigned this Sep 22, 2025
@tuxes3 tuxes3 force-pushed the fix/186-vuln-stored-xss branch 2 times, most recently from 29c7bfc to 1bd0488 Compare September 23, 2025 19:40
Formatters no longer treat their output as HTML safe by default. This closes a stored XSS vector where unsanitized user input could inject script content.

Existing formatters must now explicitly implement isHtmlSafe() to return true *and* ensure proper escaping/sanitization before claiming safety.

BREAKING CHANGE: Default formatter behavior changed; outputs are now considered unsafe HTML unless explicitly marked safe. Audit custom formatter implementations.

Signed-off-by: Nicolo Singer <nicolo@whatwedo.ch>
@tuxes3 tuxes3 force-pushed the fix/186-vuln-stored-xss branch from 1bd0488 to 1a99afb Compare September 23, 2025 19:43
@tuxes3 tuxes3 merged commit ade2a27 into develop Sep 23, 2025
7 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants