`sanitize-html` prior to version 2.0.0-beta is vulnerable to Cross-site Scripting (XSS). The `sanitizeHtml()` function in `index.js` does not sanitize content when using the custom `transformTags` option, which is intended to convert attribute values into text. As a result, malicious input can be transformed into executable code.
Metrics
Affected Vendors & Products
References
History
Mon, 08 Sep 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apostrophecms
Apostrophecms sanitize-html |
|
Vendors & Products |
Apostrophecms
Apostrophecms sanitize-html |
Mon, 08 Sep 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | `sanitize-html` prior to version 2.0.0-beta is vulnerable to Cross-site Scripting (XSS). The `sanitizeHtml()` function in `index.js` does not sanitize content when using the custom `transformTags` option, which is intended to convert attribute values into text. As a result, malicious input can be transformed into executable code. | |
Weaknesses | CWE-79 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Checkmarx
Published:
Updated: 2025-09-08T15:18:19.841Z
Reserved: 2025-09-05T16:03:18.243Z
Link: CVE-2019-25225

No data.

Status : Received
Published: 2025-09-08T10:15:33.440
Modified: 2025-09-08T10:15:33.440
Link: CVE-2019-25225

No data.

Updated: 2025-09-08T15:17:27Z