Skip to content

js: use safe DOM construction for milestone and assignee selection#8178

Merged
unknwon merged 4 commits intomainfrom
unknwon/fix-xss-issue-title
Feb 14, 2026
Merged

js: use safe DOM construction for milestone and assignee selection#8178
unknwon merged 4 commits intomainfrom
unknwon/fix-xss-issue-title

Conversation

@unknwon
Copy link
Member

@unknwon unknwon commented Feb 14, 2026

Summary

  • Use jQuery DOM APIs (.text(), .attr(), createTextNode) instead of string concatenation with .html() to prevent user-controlled text from being reinterpreted as HTML during milestone and assignee selection on the issue page.

Security

unknwon and others added 2 commits February 13, 2026 23:07
…8178)

Use jQuery DOM APIs (.text(), .attr(), createTextNode) instead of
string concatenation with .html() to prevent user-controlled text from
being reinterpreted as HTML.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@unknwon unknwon added this to the 0.14.2 milestone Feb 14, 2026
@unknwon unknwon requested a review from Copilot February 14, 2026 04:09
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This pull request addresses a DOM-based XSS vulnerability by replacing unsafe string concatenation with jQuery's safe DOM construction APIs when rendering milestone and assignee selections on the issue page.

Changes:

  • Replaced .html() with string concatenation using safe jQuery methods (.text(), .attr(), createTextNode) for milestone selection
  • Applied the same safe DOM construction pattern for assignee selection including avatar images
  • Added security fix entry to CHANGELOG.md

Reviewed changes

Copilot reviewed 2 out of 2 changed files in this pull request and generated 1 comment.

File Description
public/js/gogs.js Refactored milestone and assignee selection to use safe DOM construction methods instead of string concatenation
CHANGELOG.md Documented the security fix for DOM-based XSS vulnerability

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Copilot reviewed 2 out of 2 changed files in this pull request and generated 1 comment.


💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@unknwon unknwon merged commit 9001a68 into main Feb 14, 2026
6 checks passed
@unknwon unknwon deleted the unknwon/fix-xss-issue-title branch February 14, 2026 04:24
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant