Comments rendered via v-html without sanitization, enabling stored XSS.
Comments in Comments.vue were parsed by markdown-it with html: true and injected via v-html without DOMPurify. A user with Commenter role can inject arbitrary HTML that executes for all viewers.
Stored XSS — malicious scripts execute for any user viewing the comment.
This issue was discovered by an AI agent developed by the GitHub Security Lab and reviewed by GHSL team members @p- (Peter Stockli) and @m-y-mo (Man Yue Mo).
{
"github_reviewed": true,
"cwe_ids": [
"CWE-79"
],
"github_reviewed_at": "2026-03-03T20:59:38Z",
"nvd_published_at": "2026-03-02T17:16:34Z",
"severity": "MODERATE"
}