`sanitize-html` prior to version 2.0.0-beta is vulnerable to Cross-site Scripting (XSS). The `sanitizeHtml()` function in `index.js` does not sanitize content when using the custom `transformTags` option, which is intended to convert attribute values into text. As a result, malicious input can be transformed into executable code.
References
Link | Resource |
---|---|
https://github.com/Checkmarx/Vulnerabilities-Proofs-of-Concept/tree/main/2019/CVE-2019-25225 | Exploit Third Party Advisory |
https://github.com/apostrophecms/sanitize-html/commit/712cb6895825c8bb6ede71a16b42bade42abcaf3 | Patch |
https://github.com/apostrophecms/sanitize-html/issues/293 | Issue Tracking Vendor Advisory |
https://github.com/apostrophecms/sanitize-html/pull/156 | Issue Tracking Patch |
Configurations
History
19 Sep 2025, 15:18
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:apostrophecms:sanitize-html:*:*:*:*:*:node.js:*:* | |
References | () https://github.com/Checkmarx/Vulnerabilities-Proofs-of-Concept/tree/main/2019/CVE-2019-25225 - Exploit, Third Party Advisory | |
References | () https://github.com/apostrophecms/sanitize-html/commit/712cb6895825c8bb6ede71a16b42bade42abcaf3 - Patch | |
References | () https://github.com/apostrophecms/sanitize-html/issues/293 - Issue Tracking, Vendor Advisory | |
References | () https://github.com/apostrophecms/sanitize-html/pull/156 - Issue Tracking, Patch | |
First Time |
Apostrophecms
Apostrophecms sanitize-html |
08 Sep 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-08 10:15
Updated : 2025-09-19 15:18
NVD link : CVE-2019-25225
Mitre link : CVE-2019-25225
CVE.ORG link : CVE-2019-25225
JSON object : View
Products Affected
apostrophecms
- sanitize-html
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')