Skip to content

Passing in a non-string 'html' argument can lead to unsanitized output

Moderate
ericnorris published GHSA-qxg5-2qff-p49r Jun 18, 2021

Package

npm striptags (npm)

Affected versions

<3.2.0

Patched versions

3.2.0

Description

A type-confusion vulnerability can cause striptags to concatenate unsanitized strings when an array-like object is passed in as the html parameter. This can be abused by an attacker who can control the shape of their input, e.g. if query parameters are passed directly into the function.

Impact

XSS

Patches

3.2.0

Workarounds

Ensure that the html parameter is a string before calling the function.

Severity

Moderate

CVE ID

CVE-2021-32696

Weaknesses

No CWEs

Credits