CVE-2023-43643

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-43643
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-43643.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-43643
Aliases
Downstream
Published
2023-10-09T13:31:46Z
Modified
2025-10-22T18:39:20.375638Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
mXSS in AntiSamy
Details

AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. Prior to version 1.7.4, there is a potential for a mutation XSS (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the preserveComments directive must be enabled in your policy file and also allow for certain tags at the same time. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. This issue has been patched in AntiSamy 1.7.4 and later.

Database specific
{
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/nahsra/antisamy

Affected ranges

Type
GIT
Repo
https://github.com/nahsra/antisamy
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.6.3

v1.*

v1.5.10
v1.5.11
v1.5.12
v1.5.13
v1.5.7
v1.5.8
v1.5.9
v1.6.0
v1.6.1
v1.6.2
v1.6.4
v1.6.5
v1.6.6
v1.6.6.1
v1.6.7
v1.6.8
v1.7.0
v1.7.1
v1.7.2
v1.7.3