User-controlled metadata from .cabal files are rendered into HTML
href attributes without proper sanitization, enabling stored
Cross-Site Scripting (XSS) attacks. The specific fields affected
are:
homepagebug-reportssource-repository.locationdescription (Haddock hyperlinks)The Haskell Security Response Team audited the entire corpus of
published packages on hackage.haskell.org—all published
package versions but not candidates. No exploitation attempts
were detected.
To fix the issue, hackage-server now inspects target URIs and only
produces a hyperlink when the URI has an approved scheme: http,
https, and (only for some fields) mailto.
The fix has been committed and deployed on
hackage.haskell.org. Other operations of hackage-server
instances should update as soon as possible to commit
2de3ae45082f8f3f29a41f6aff620d09d0e74058 or later.
hackage.haskell.org.{
"home": "https://github.com/haskell/security-advisories",
"osvs": "https://raw.githubusercontent.com/haskell/security-advisories/refs/heads/generated/osv-export",
"repository": "https://github.com/haskell/security-advisories"
}"https://github.com/haskell/security-advisories/blob/generated/osv-export/2026/HSEC-2026-0004.json"
"https://raw.githubusercontent.com/haskell/security-advisories/refs/heads/generated/osv-export/2026/HSEC-2026-0004.json"
"https://github.com/haskell/security-advisories/tree/main/advisories/published/2026/HSEC-2026-0004.md"