Fix Critical XSS Vulnerability ({@html} without sanitization) #1

Closed
opened 2026-04-03 12:22:13 +02:00 by schreifuchs · 0 comments
Owner

Where: src/routes/akti/[aktiId]/+page.svelte
Why: Rendering user input via {@html data.akti.body} without sanitization allows malicious scripts to be injected.
Fix: Use the already installed sanitize-html library on the server to sanitize changeRequest.body before updating/inserting into the database.

**Where:** `src/routes/akti/[aktiId]/+page.svelte` **Why:** Rendering user input via `{@html data.akti.body}` without sanitization allows malicious scripts to be injected. **Fix:** Use the already installed `sanitize-html` library on the server to sanitize `changeRequest.body` before updating/inserting into the database.
schreifuchs added the ai-generated label 2026-04-03 12:26:21 +02:00
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: schreifuchs/aktiteil#1