Vulnerability DatabaseGHSA-vfpf-xmwh-8m65

GHSA-vfpf-xmwh-8m65
Ruby vulnerability analysis and mitigation

Overview

The ProsemirrorToHtml gem (version < 0.2.1) contains a Cross-Site Scripting (XSS) vulnerability identified as GHSA-vfpf-xmwh-8m65. The vulnerability was discovered and disclosed on November 7, 2025, affecting applications that use the gem to convert ProseMirror documents to HTML. While the gem properly escapes tag content, it fails to escape HTML attribute values, potentially allowing attackers to inject malicious JavaScript code (GitHub Advisory).

Technical details

The vulnerability has been assigned a CVSS v3.1 score of 7.6 (High severity) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N. The issue stems from improper neutralization of input during web page generation (CWE-79), specifically in the HTML attribute value handling. The vulnerable code is located in the HTML rendering process where attribute values are directly interpolated into the output without proper escaping (GitHub Advisory).

Impact

The vulnerability affects any application using prosemirrortohtml to convert ProseMirror documents to HTML, with applications processing user-generated ProseMirror content being at highest risk. Attackers can exploit this vulnerability through various HTML attributes including href attributes with javascript: protocol, event handlers, onerror attributes on images, and other HTML attributes capable of executing JavaScript. When successfully exploited, malicious JavaScript code can be executed in victims' browsers (GitHub Advisory).

Mitigation and workarounds

A fix is available in version 0.2.1, which implements proper escaping of HTML attribute values using CGI.escapeHTML. Until upgrading is possible, several workarounds are recommended: 1) Implement output sanitization using libraries like Sanitize or Loofah, 2) Add strict Content Security Policy (CSP) headers to prevent inline JavaScript execution, 3) Validate and sanitize ProseMirror documents before conversion (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Ruby vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-4249-gjr8-jpq3HIGH8.7
  • RubyRuby
  • prosemirror_to_html
NoYesNov 13, 2025
CVE-2025-64501HIGH7.6
  • RubyRuby
  • prosemirror_to_html
NoYesNov 10, 2025
GHSA-vfpf-xmwh-8m65HIGH7.6
  • RubyRuby
  • prosemirror_to_html
NoYesNov 07, 2025
GHSA-52c5-vh7f-26fxHIGH7.6
  • RubyRuby
  • prosemirror_to_html
NoYesNov 06, 2025
CVE-2025-12790HIGH7.4
  • RubyRuby
  • mqtt
NoYesNov 06, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management