In the XSS Protection API module before 1.0.12 in Apache Sling, the encoding done by the XSSAPI.encodeForJSString() method is not restrictive enough and for some input patterns allows script tags to pass through unencoded, leading to potential XSS vulnerabilities.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-5871 | In the XSS Protection API module before 1.0.12 in Apache Sling, the encoding done by the XSSAPI.encodeForJSString() method is not restrictive enough and for some input patterns allows script tags to pass through unencoded, leading to potential XSS vulnerabilities. |
![]() |
GHSA-xwf4-88xr-hx2j | Cross site scripting in Apache Sling |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-09-16T22:21:15.752Z
Reserved: 2016-06-10T00:00:00
Link: CVE-2016-5394

No data.

Status : Deferred
Published: 2017-07-19T15:29:00.180
Modified: 2025-04-20T01:37:25.860
Link: CVE-2016-5394

No data.

No data.