Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-19375 | sanitize-html is vulnerable to XSS through incomprehensive sanitization |
Github GHSA |
GHSA-qhxp-v273-g94h | sanitize-html is vulnerable to XSS through incomprehensive sanitization |
Fri, 19 Sep 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apostrophecms:sanitize-html:*:*:*:*:*:node.js:*:* |
Tue, 09 Sep 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | sanitize-html: sanitize-html cross site scripting | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 08 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 08 Sep 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apostrophecms
Apostrophecms sanitize-html |
|
| Vendors & Products |
Apostrophecms
Apostrophecms sanitize-html |
Mon, 08 Sep 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | `sanitize-html` prior to version 2.0.0-beta is vulnerable to Cross-site Scripting (XSS). The `sanitizeHtml()` function in `index.js` does not sanitize content when using the custom `transformTags` option, which is intended to convert attribute values into text. As a result, malicious input can be transformed into executable code. | |
| Weaknesses | CWE-79 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Checkmarx
Published:
Updated: 2025-09-08T15:18:19.841Z
Reserved: 2025-09-05T16:03:18.243Z
Link: CVE-2019-25225
Updated: 2025-09-08T15:17:13.503Z
Status : Analyzed
Published: 2025-09-08T10:15:33.440
Modified: 2025-09-19T15:18:42.913
Link: CVE-2019-25225
OpenCVE Enrichment
Updated: 2025-09-08T15:17:27Z
EUVD
Github GHSA