Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-26866 | Promptcraft Forge Studio is a toolkit for evaluating, optimizing, and maintaining LLM-powered applications. All versions of Promptcraft Forge Studio sanitize user input using regex blacklists such as r`eplace(/javascript:/gi, '')`. Because the package uses multi-character tokens and each replacement is applied only once, removing one occurrence can create a new dangerous token due to overlap. The “sanitized” value may still contain an executable payload when used in href/src (or injected into the DOM). There is currently no fix for this issue. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 05 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Promptcraft-forge-studio Project
Promptcraft-forge-studio Project promptcraft-forge-studio |
|
| Vendors & Products |
Promptcraft-forge-studio Project
Promptcraft-forge-studio Project promptcraft-forge-studio |
Thu, 04 Sep 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 04 Sep 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Promptcraft Forge Studio is a toolkit for evaluating, optimizing, and maintaining LLM-powered applications. All versions of Promptcraft Forge Studio sanitize user input using regex blacklists such as r`eplace(/javascript:/gi, '')`. Because the package uses multi-character tokens and each replacement is applied only once, removing one occurrence can create a new dangerous token due to overlap. The “sanitized” value may still contain an executable payload when used in href/src (or injected into the DOM). There is currently no fix for this issue. | |
| Title | Promptcraft Forge Studio: Complete Sanitizer Bypass Enables XSS via Overlapping Patterns | |
| Weaknesses | CWE-184 CWE-20 CWE-79 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-04T20:13:09.147Z
Reserved: 2025-08-29T16:19:59.010Z
Link: CVE-2025-58353
Updated: 2025-09-04T20:13:03.273Z
Status : Awaiting Analysis
Published: 2025-09-04T20:15:39.420
Modified: 2025-09-05T17:47:10.303
Link: CVE-2025-58353
No data.
OpenCVE Enrichment
Updated: 2025-09-05T14:02:14Z
EUVD