CVE-2025-52561

Source
https://cve.org/CVERecord?id=CVE-2025-52561
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-52561.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-52561
Aliases
Published
2025-06-23T21:00:13.699Z
Modified
2026-04-02T12:52:06.474624Z
Severity
  • 6.9 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N CVSS Calculator
Summary
HTMLSanitizer.jl Possible XSS
Details

HTMLSanitizer.jl is a Whitelist-based HTML sanitizer. Prior to version 0.2.1, when adding the style tag to the whitelist, content inside the tag is incorrectly unescaped, and closing tags injected as content are interpreted as real HTML, enabling tag injection and JavaScript execution. This could result in possible cross-site scripting (XSS) in any HTML that is sanitized with this library. This issue has been patched in version 0.2.1. A workaround involves adding the math and svg elements to the whitelist manually.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/52xxx/CVE-2025-52561.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/juliacomputing/htmlsanitizer.jl

Affected ranges

Type
GIT
Repo
https://github.com/juliacomputing/htmlsanitizer.jl
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*
v0.1.0
v0.1.1
v0.1.2
v0.2.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-52561.json"