
Cloud Vulnerability DB
コミュニティ主導の脆弱性データベース
OWASP Java HTML Sanitizer version 20240325.1 contains a Cross-Site Scripting (XSS) vulnerability that was discovered and disclosed on November 25, 2025. The vulnerability affects the HTML sanitization process when the HtmlPolicyBuilder allows noscript and style tags with allowTextIn functionality inside the style tag (GitHub Advisory).
The vulnerability occurs specifically when HtmlPolicyBuilder allows both noscript and style tags with allowTextIn inside style tags. The issue arises from how the browser perceives noscript tags post-sanitization. When a payload combines noscript tag with style tag, the browser processes the noscript wrapper around the style tag differently, allowing script payload to be executed as valid HTML. The vulnerability has been assigned a CVSS 4.0 base score of 8.6 (High) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N (GitHub Advisory).
The vulnerability can lead to Cross-Site Scripting (XSS) attacks in applications using the affected version of the OWASP Java HTML Sanitizer. This allows attackers to execute arbitrary web scripts or HTML in the context of other users' browsers, potentially leading to theft of sensitive information, session hijacking, or other malicious actions (GitHub Advisory).
At the time of publication, no known patch is available for this vulnerability. Users should avoid configuring HtmlPolicyBuilder to allow both noscript and style tags with allowTextIn functionality inside style tags (GitHub Advisory).
ソース: このレポートは AI を使用して生成されました
無料の脆弱性評価
9つのセキュリティドメインにわたるクラウドセキュリティプラクティスを評価して、リスクレベルをベンチマークし、防御のギャップを特定します。
パーソナライズされたデモを見る
"私が今まで見た中で最高のユーザーエクスペリエンスは、クラウドワークロードを完全に可視化します。"
"Wiz を使えば、クラウド環境で何が起こっているかを 1 つの画面で確認することができます"
"Wizが何かを重要視した場合、それは実際に重要であることを私たちは知っています。"