Vulnerabilities > Apostrophecms > Sanitize Html > 1.11.1

DATE CVE VULNERABILITY TITLE RISK
2024-02-24 CVE-2024-21501 Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies).
network
low complexity
apostrophecms fedoraproject
5.3
2022-08-30 CVE-2022-25887 Unspecified vulnerability in Apostrophecms Sanitize-Html
The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment removal.
network
low complexity
apostrophecms
7.5
2021-02-08 CVE-2021-26540 Unspecified vulnerability in Apostrophecms Sanitize-Html
Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the "allowedIframeHostnames" option when the "allowIframeRelativeUrls" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with "/\\example.com".
network
low complexity
apostrophecms
5.3
2021-02-08 CVE-2021-26539 Unspecified vulnerability in Apostrophecms Sanitize-Html
Apostrophe Technologies sanitize-html before 2.3.1 does not properly handle internationalized domain name (IDN) which could allow an attacker to bypass hostname whitelist validation set by the "allowedIframeHostnames" option.
network
low complexity
apostrophecms
5.3