Rich text cell content rendered via v-html without sanitization, enabling stored XSS.
Rich text in TextArea.vue was parsed by markdown-it with html: true and injected via v-html without DOMPurify. A user with Editor role can inject arbitrary HTML that executes for all viewers.
Stored XSS — malicious scripts execute for any user viewing the cell.
This issue was discovered by an AI agent developed by the GitHub Security Lab and reviewed by GHSL team members @p- (Peter Stockli) and @m-y-mo (Man Yue Mo).
{
"github_reviewed": true,
"github_reviewed_at": "2026-03-03T20:59:50Z",
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"nvd_published_at": "2026-03-02T17:16:35Z"
}