Apostrophecms Sanitize-Html vulnerabilities

10 known vulnerabilities affecting apostrophecms/sanitize-html.

Total CVEs
10
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM9

Vulnerabilities

Page 1 of 1
CVE-2026-40186MEDIUMCVSS 6.1v>= 2.17.1, < 2.17.22026-04-15
CVE-2026-40186 [MEDIUM] CWE-79 CVE-2026-40186: ApostropheCMS is an open-source Node.js content management system. A regression introduced in commit ApostropheCMS is an open-source Node.js content management system. A regression introduced in commit 49d0bb7, included in versions 2.17.1 of the ApostropheCMS-maintained sanitize-html package bypasses allowedTags enforcement for text inside nonTextTagsArray elements (textarea and option). ApostropheCMS version 4.28.0 is affected through its dependenc
cvelistv5ghsanvd
CVE-2019-25225MEDIUMCVSS 6.1fixed in 2.0.02025-09-08
CVE-2019-25225 [MEDIUM] CWE-79 CVE-2019-25225: `sanitize-html` prior to version 2.0.0-beta is vulnerable to Cross-site Scripting (XSS). The `saniti `sanitize-html` prior to version 2.0.0-beta is vulnerable to Cross-site Scripting (XSS). The `sanitizeHtml()` function in `index.js` does not sanitize content when using the custom `transformTags` option, which is intended to convert attribute values into text. As a result, malicious input can be transformed into executable code.
ghsanvdosv
CVE-2014-125128MEDIUMCVSS 6.1fixed in 1.0.32025-09-08
CVE-2014-125128 [MEDIUM] CWE-79 CVE-2014-125128: 'sanitize-html' prior to version 1.0.3 is vulnerable to Cross-site Scripting (XSS). The function 'na 'sanitize-html' prior to version 1.0.3 is vulnerable to Cross-site Scripting (XSS). The function 'naughtyHref' doesn't properly validate the hyperreference (`href`) attribute in anchor tags (``), allowing bypasses that contain different casings, whitespace characters, or hexadecimal encodings.
nvd
CVE-2024-21501MEDIUMCVSS 5.3fixed in 2.12.12024-02-24
CVE-2024-21501 [MEDIUM] CWE-200 CVE-2024-21501: Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could exploit this vulnerability to gather details about the file system structure and dependencies of the
cvelistv5ghsanvdosv
CVE-2022-25887HIGHCVSS 7.5fixed in 2.7.1≥ unspecified, < 2.7.12022-08-30
CVE-2022-25887 [HIGH] CWE-1333 CVE-2022-25887: The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment removal.
cvelistv5ghsanvdosv
CVE-2021-26539MEDIUMCVSS 5.3fixed in 2.3.12021-02-08
CVE-2021-26539 [MEDIUM] CVE-2021-26539: Apostrophe Technologies sanitize-html before 2.3.1 does not properly handle internationalized domain Apostrophe Technologies sanitize-html before 2.3.1 does not properly handle internationalized domain name (IDN) which could allow an attacker to bypass hostname whitelist validation set by the "allowedIframeHostnames" option.
ghsanvdosv
CVE-2021-26540MEDIUMCVSS 5.3fixed in 2.3.22021-02-08
CVE-2021-26540 [MEDIUM] CVE-2021-26540: Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by t Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the "allowedIframeHostnames" option when the "allowIframeRelativeUrls" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with "/\\example.com".
ghsanvdosv
CVE-2016-1000237MEDIUM≥ 0, < 1.4.32020-04-16
CVE-2016-1000237 [MEDIUM] CWE-79 Cross-Site Scripting in sanitize-html Cross-Site Scripting in sanitize-html Affected versions of `sanitize-html` do not sanitize input recursively, which may allow an attacker to execute arbitrary Javascript. ## Recommendation Update to version 1.4.3 or later.
ghsaosv
CVE-2017-16017MEDIUM≥ 0, < 1.2.32018-11-09
CVE-2017-16017 [MEDIUM] CWE-79 Cross-Site Scripting in sanitize-html Cross-Site Scripting in sanitize-html Affected versions of `sanitize-html` are vulnerable to cross-site scripting. ## Proof of Concept: `` produces the following: `` This is definitely invalid HTML, but would suggest that it's being interpreted incorrectly by the parser. ## Recommendation Update to version 1.2.3 or later.
ghsaosv
CVE-2017-16016MEDIUM≥ 0, < 1.11.42018-11-09
CVE-2017-16016 [MEDIUM] CWE-79 Cross-Site Scripting in sanitize-html Cross-Site Scripting in sanitize-html Affected versions of `sanitize-html` are vulnerable to cross-site scripting when allowedTags includes at least one `nonTextTag`. ## Proof of Concept ```js var sanitizeHtml = require('sanitize-html'); var dirty = '! !'; var clean = sanitizeHtml(dirty, { allowedTags: [ 'textarea' ] }); console.log(clean); // !! ``` ## Recommendation Update to version 1.11.4 or later.
ghsaosv