Vulnerability DatabaseGHSA-r68h-jhhj-9jvm

GHSA-r68h-jhhj-9jvm
Java vulnerability analysis and mitigation

Overview

The GHSA-r68h-jhhj-9jvm vulnerability affects the Validator.isValidSafeHTML method in ESAPI (Enterprise Security API) Java Legacy library for versions prior to 2.6.0.0. This vulnerability was published on November 24, 2023, and affects all versions of ESAPI dating back at least 15 years to ESAPI 1.3 release. The issue involves the method potentially returning false negatives, incorrectly identifying unsafe input as safe (GitHub Advisory).

Technical details

The vulnerability lies in the Validator.isValidSafeHTML method's inability to correctly identify unsafe HTML input. The method can produce false negatives by returning true for input that could potentially lead to XSS vulnerabilities. The issue has been assigned a Moderate severity rating, though no specific CVSS score has been provided. The vulnerability is associated with CWE-79 and CWE-80, relating to cross-site scripting vulnerabilities (GitHub Advisory).

Impact

When exploited, this vulnerability can lead to Cross-Site Scripting (XSS) vulnerabilities in applications that rely on the Validator.isValidSafeHTML method to validate HTML input. The impact is significant as the method may incorrectly validate potentially malicious HTML content as safe, leading to security vulnerabilities in implementing applications (GitHub Advisory).

Mitigation and workarounds

As there is no direct patch available for this vulnerability, the recommended workaround is to stop using the Validator.isValidSafeHTML method entirely. Users are advised to use Validator.getValidSafeHTML with the default antisamy-esapi.xml AntiSamy policy file instead, which is believed to be safe. The vulnerable method has been deprecated and removed in version 2.6.0.0 of the ESAPI jar (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-14306CRITICAL10
  • JavaJava
  • net.sf.robocode:robocode.core
NoYesDec 09, 2025
CVE-2025-14307CRITICAL9.3
  • JavaJava
  • net.sf.robocode:robocode.battle
NoYesDec 09, 2025
CVE-2025-66566HIGH8.2
  • JavaJava
  • at.yawk.lz4:lz4-java
NoYesDec 05, 2025
CVE-2025-66623HIGH7.4
  • JavaJava
  • io.strimzi:strimzi
NoYesDec 05, 2025
GHSA-93fv-4pm9-xp28MEDIUM6.9
  • JavaJava
  • net.dv8tion:jda
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management