Vulnerability DatabaseRUSTSEC-2025-0071

RUSTSEC-2025-0071
Rust vulnerability analysis and mitigation

Affected versions of this crate did not correctly strip namespace-incompatible tags in certain situations, causing it to incorrectly account for differences between HTML, SVG, and MathML. This vulnerability only has an effect when the svg or math tag is allowed, because it relies on a tag being parsed as html during the cleaning process, but serialized in a way that causes in to be parsed as xml by the browser. Additionally, the application using this library must allow a tag that is parsed as raw text in HTML. These [elements] are:

  • title
  • textarea
  • xmp
  • iframe
  • noembed
  • noframes
  • plaintext
  • noscript
  • style
  • script Applications that do not explicitly allow any of these tags should not be affected, since none are allowed by default.

SourceNVD

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-393w-9x6h-8gc7HIGH8.2
  • RustRust
  • pingora-core
NoYesSep 17, 2025
CVE-2025-59825MEDIUM6.1
  • RustRust
  • trustee-guest-components
NoYesSep 23, 2025
GHSA-mm7x-qfjj-5g2cLOW1.7
  • RustRust
  • ammonia
NoYesSep 22, 2025
RUSTSEC-2025-0071N/AN/A
  • RustRust
  • ammonia
NoYesSep 21, 2025
RUSTSEC-2025-0070N/AN/A
  • RustRust
  • pingora-core
NoYesSep 17, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management