Skip to content

Commit d855392

Browse files
1 parent 76ada79 commit d855392

File tree

2 files changed

+60
-10
lines changed

2 files changed

+60
-10
lines changed

advisories/unreviewed/2026/04/GHSA-c97m-vxhj-p7j6/GHSA-c97m-vxhj-p7j6.json renamed to advisories/github-reviewed/2026/04/GHSA-c97m-vxhj-p7j6/GHSA-c97m-vxhj-p7j6.json

Lines changed: 30 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-c97m-vxhj-p7j6",
4-
"modified": "2026-04-17T15:31:17Z",
4+
"modified": "2026-04-18T01:02:42Z",
55
"published": "2026-04-17T15:31:17Z",
66
"aliases": [
77
"CVE-2026-5160"
88
],
9+
"summary": "goldmark vulnerable to Cross-site Scripting (XSS)",
910
"details": "Versions of the package github.com/yuin/goldmark/renderer/html before 1.7.17 are vulnerable to Cross-site Scripting (XSS) due to improper ordering of URL validation and normalization. The renderer validates link destinations using a prefix-based check (IsDangerousURL) before resolving HTML entities. This allows an attacker to bypass protocol filtering by encoding dangerous schemes using HTML5 named character references. For example, a payload such as javascript:alert(1) is not recognized as dangerous during validation, leading to arbitrary script execution in the context of applications that render the URL.",
1011
"severity": [
1112
{
@@ -14,10 +15,30 @@
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "Go",
25+
"name": "github.com/yuin/goldmark/renderer/html"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"fixed": "1.7.17"
36+
}
37+
]
38+
}
39+
]
1840
}
1941
],
20-
"affected": [],
2142
"references": [
2243
{
2344
"type": "ADVISORY",
@@ -27,6 +48,10 @@
2748
"type": "WEB",
2849
"url": "https://github.com/yuin/goldmark/commit/cb46bbc4eca29d55aa9721e04ad207c23ccc44f9"
2950
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/yuin/goldmark"
54+
},
3055
{
3156
"type": "WEB",
3257
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMYUINGOLDMARKRENDERERHTML-15838406"
@@ -37,8 +62,8 @@
3762
"CWE-79"
3863
],
3964
"severity": "MODERATE",
40-
"github_reviewed": false,
41-
"github_reviewed_at": null,
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2026-04-18T01:02:42Z",
4267
"nvd_published_at": "2026-04-15T06:16:13Z"
4368
}
4469
}

advisories/unreviewed/2026/04/GHSA-xxxg-x793-7fq3/GHSA-xxxg-x793-7fq3.json renamed to advisories/github-reviewed/2026/04/GHSA-xxxg-x793-7fq3/GHSA-xxxg-x793-7fq3.json

Lines changed: 30 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xxxg-x793-7fq3",
4-
"modified": "2026-04-12T15:30:27Z",
4+
"modified": "2026-04-18T01:01:26Z",
55
"published": "2026-04-12T15:30:27Z",
66
"aliases": [
77
"CVE-2019-25710"
88
],
9+
"summary": "Dolibarr has SQL injection vulnerability in the rowid parameter of the admin dict.php",
910
"details": "Dolibarr ERP-CRM 8.0.4 contains an SQL injection vulnerability in the rowid parameter of the admin dict.php endpoint that allows attackers to execute arbitrary SQL queries. Attackers can inject malicious SQL code through the rowid POST parameter to extract sensitive database information using error-based SQL injection techniques.",
1011
"severity": [
1112
{
@@ -14,15 +15,39 @@
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "Packagist",
25+
"name": "dolibarr/dolibarr"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"last_affected": "8.0.4"
36+
}
37+
]
38+
}
39+
]
1840
}
1941
],
20-
"affected": [],
2142
"references": [
2243
{
2344
"type": "ADVISORY",
2445
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25710"
2546
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/Dolibarr/dolibarr"
50+
},
2651
{
2752
"type": "WEB",
2853
"url": "https://sourceforge.net/projects/dolibarr/files/Dolibarr%20ERP-CRM/8.0.4/dolibarr-8.0.4.zip"
@@ -45,8 +70,8 @@
4570
"CWE-89"
4671
],
4772
"severity": "HIGH",
48-
"github_reviewed": false,
49-
"github_reviewed_at": null,
73+
"github_reviewed": true,
74+
"github_reviewed_at": "2026-04-18T01:01:26Z",
5075
"nvd_published_at": "2026-04-12T13:16:34Z"
5176
}
5277
}

0 commit comments

Comments
 (0)