Lookup for vulnerable packages by Package URL.

Purlpkg:gem/rails-html-sanitizer@1.0.2
Typegem
Namespace
Namerails-html-sanitizer
Version1.0.2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.6.1
Latest_non_vulnerable_version1.6.1
Affected_by_vulnerabilities
0
url VCID-2ece-9xu2-z7ea
vulnerability_id VCID-2ece-9xu2-z7ea
summary
XSS vulnerability - white list bypass
Carefully crafted strings can cause user input to bypass the sanitization in the white list sanitizer which can lead to an XSS attack.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7580
reference_id
reference_type
scores
0
value 0.00163
scoring_system epss
scoring_elements 0.37298
published_at 2026-04-08T12:55:00Z
1
value 0.00163
scoring_system epss
scoring_elements 0.37247
published_at 2026-04-07T12:55:00Z
2
value 0.00163
scoring_system epss
scoring_elements 0.37419
published_at 2026-04-04T12:55:00Z
3
value 0.00163
scoring_system epss
scoring_elements 0.37395
published_at 2026-04-02T12:55:00Z
4
value 0.00163
scoring_system epss
scoring_elements 0.3723
published_at 2026-04-01T12:55:00Z
5
value 0.00163
scoring_system epss
scoring_elements 0.37306
published_at 2026-04-16T12:55:00Z
6
value 0.00163
scoring_system epss
scoring_elements 0.3726
published_at 2026-04-13T12:55:00Z
7
value 0.00163
scoring_system epss
scoring_elements 0.37288
published_at 2026-04-12T12:55:00Z
8
value 0.00163
scoring_system epss
scoring_elements 0.37321
published_at 2026-04-11T12:55:00Z
9
value 0.00163
scoring_system epss
scoring_elements 0.3731
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7580
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7580
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7580
5
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
6
reference_url https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78
7
reference_url https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ
8
reference_url https://groups.google.com/forum/#!topic/rubyonrails-security/uh--W4TDwmI
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements
url https://groups.google.com/forum/#!topic/rubyonrails-security/uh--W4TDwmI
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7580
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-7580
10
reference_url https://web.archive.org/web/20160128075017/http://www.securitytracker.com/id/1034816
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20160128075017/http://www.securitytracker.com/id/1034816
11
reference_url http://www.openwall.com/lists/oss-security/2016/01/25/15
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2016/01/25/15
12
reference_url http://www.securitytracker.com/id/1034816
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034816
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812814
reference_id 812814
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812814
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:html_sanitizer:*:*:*:*:*:ruby:*:*
reference_id cpe:2.3:a:rubyonrails:html_sanitizer:*:*:*:*:*:ruby:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:html_sanitizer:*:*:*:*:*:ruby:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.6:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.6:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.6:rc1:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta1.1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:5.0.0:beta1.1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta1.1:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:5.0.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta2:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:5.0.0:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta3:*:*:*:*:*:*
43
reference_url https://github.com/advisories/GHSA-ghqm-pgxj-37gq
reference_id GHSA-ghqm-pgxj-37gq
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-ghqm-pgxj-37gq
fixed_packages
0
url pkg:gem/rails-html-sanitizer@1.0.3
purl pkg:gem/rails-html-sanitizer@1.0.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63em-3vdj-j3cu
1
vulnerability VCID-782b-usu3-bbhd
2
vulnerability VCID-apxn-up79-x3ge
3
vulnerability VCID-cphr-tdzs-x7ar
4
vulnerability VCID-ete9-xwuw-puf8
5
vulnerability VCID-rhb1-h2b8-jucb
6
vulnerability VCID-rz3c-6h7r-6bam
7
vulnerability VCID-ueen-aybd-tqh2
8
vulnerability VCID-wxfr-bs81-augc
9
vulnerability VCID-xby9-avva-a3e5
10
vulnerability VCID-zcs7-hzze-u3a5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rails-html-sanitizer@1.0.3
aliases CVE-2015-7580, GHSA-ghqm-pgxj-37gq
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ece-9xu2-z7ea
1
url VCID-327c-vdne-j7ar
vulnerability_id VCID-327c-vdne-j7ar
summary
Moderate severity vulnerability that affects rails-html-sanitizer
Withdrawn, accidental duplicate publish.

Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.
references
0
reference_url https://github.com/advisories/GHSA-qc8j-m8j3-rjq6
reference_id
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-qc8j-m8j3-rjq6
1
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7578
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-7578
fixed_packages
0
url pkg:gem/rails-html-sanitizer@1.0.3
purl pkg:gem/rails-html-sanitizer@1.0.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63em-3vdj-j3cu
1
vulnerability VCID-782b-usu3-bbhd
2
vulnerability VCID-apxn-up79-x3ge
3
vulnerability VCID-cphr-tdzs-x7ar
4
vulnerability VCID-ete9-xwuw-puf8
5
vulnerability VCID-rhb1-h2b8-jucb
6
vulnerability VCID-rz3c-6h7r-6bam
7
vulnerability VCID-ueen-aybd-tqh2
8
vulnerability VCID-wxfr-bs81-augc
9
vulnerability VCID-xby9-avva-a3e5
10
vulnerability VCID-zcs7-hzze-u3a5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rails-html-sanitizer@1.0.3
aliases GHSA-qc8j-m8j3-rjq6
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-327c-vdne-j7ar
2
url VCID-6158-4ade-h7ba
vulnerability_id VCID-6158-4ade-h7ba
summary
Moderate severity vulnerability that affects rails-html-sanitizer
Withdrawn, accidental duplicate publish.

Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.
references
0
reference_url https://github.com/advisories/GHSA-77pc-q5q7-qg9h
reference_id
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-77pc-q5q7-qg9h
1
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7580
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-7580
fixed_packages
0
url pkg:gem/rails-html-sanitizer@1.0.3
purl pkg:gem/rails-html-sanitizer@1.0.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63em-3vdj-j3cu
1
vulnerability VCID-782b-usu3-bbhd
2
vulnerability VCID-apxn-up79-x3ge
3
vulnerability VCID-cphr-tdzs-x7ar
4
vulnerability VCID-ete9-xwuw-puf8
5
vulnerability VCID-rhb1-h2b8-jucb
6
vulnerability VCID-rz3c-6h7r-6bam
7
vulnerability VCID-ueen-aybd-tqh2
8
vulnerability VCID-wxfr-bs81-augc
9
vulnerability VCID-xby9-avva-a3e5
10
vulnerability VCID-zcs7-hzze-u3a5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rails-html-sanitizer@1.0.3
aliases GHSA-77pc-q5q7-qg9h
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6158-4ade-h7ba
3
url VCID-63em-3vdj-j3cu
vulnerability_id VCID-63em-3vdj-j3cu
summary
Inefficient Regular Expression Complexity in rails-html-sanitizer
## Summary

Certain configurations of rails-html-sanitizer `< 1.4.4` use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption.


## Mitigation

Upgrade to rails-html-sanitizer `>= 1.4.4`.


## Severity

The maintainers have evaluated this as [High Severity 7.5 (CVSS3.1)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).


## References

- [CWE - CWE-1333: Inefficient Regular Expression Complexity (4.9)](https://cwe.mitre.org/data/definitions/1333.html)
- https://hackerone.com/reports/1684163


## Credit

This vulnerability was responsibly reported by @ooooooo-q (https://github.com/ooooooo-q).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23517.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23517.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23517
reference_id
reference_type
scores
0
value 0.0024
scoring_system epss
scoring_elements 0.47288
published_at 2026-04-13T12:55:00Z
1
value 0.0024
scoring_system epss
scoring_elements 0.47281
published_at 2026-04-12T12:55:00Z
2
value 0.0024
scoring_system epss
scoring_elements 0.47287
published_at 2026-04-08T12:55:00Z
3
value 0.0024
scoring_system epss
scoring_elements 0.47307
published_at 2026-04-11T12:55:00Z
4
value 0.0024
scoring_system epss
scoring_elements 0.47283
published_at 2026-04-09T12:55:00Z
5
value 0.0024
scoring_system epss
scoring_elements 0.47232
published_at 2026-04-07T12:55:00Z
6
value 0.00247
scoring_system epss
scoring_elements 0.47928
published_at 2026-04-02T12:55:00Z
7
value 0.00247
scoring_system epss
scoring_elements 0.4795
published_at 2026-04-04T12:55:00Z
8
value 0.00256
scoring_system epss
scoring_elements 0.49008
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23517
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23517
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
5
reference_url https://github.com/rails/rails-html-sanitizer/commit/56c61c0cebd1e493e8ad7bca2a0191609a4a6979
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-02T17:07:58Z/
url https://github.com/rails/rails-html-sanitizer/commit/56c61c0cebd1e493e8ad7bca2a0191609a4a6979
6
reference_url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-5x79-w82f-gw8w
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-02T17:07:58Z/
url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-5x79-w82f-gw8w
7
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23517.yml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23517.yml
8
reference_url https://hackerone.com/reports/1684163
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-02T17:07:58Z/
url https://hackerone.com/reports/1684163
9
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-02T17:07:58Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
10
reference_url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23517
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23517
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153
reference_id 1027153
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153720
reference_id 2153720
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153720
14
reference_url https://github.com/advisories/GHSA-5x79-w82f-gw8w
reference_id GHSA-5x79-w82f-gw8w
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5x79-w82f-gw8w
15
reference_url https://access.redhat.com/errata/RHSA-2023:2097
reference_id RHSA-2023:2097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2097
fixed_packages
0
url pkg:gem/rails-html-sanitizer@1.4.4
purl pkg:gem/rails-html-sanitizer@1.4.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-apxn-up79-x3ge
1
vulnerability VCID-cphr-tdzs-x7ar
2
vulnerability VCID-rhb1-h2b8-jucb
3
vulnerability VCID-rz3c-6h7r-6bam
4
vulnerability VCID-ueen-aybd-tqh2
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rails-html-sanitizer@1.4.4
aliases CVE-2022-23517, GHSA-5x79-w82f-gw8w, GMS-2022-8298
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-63em-3vdj-j3cu
4
url VCID-782b-usu3-bbhd
vulnerability_id VCID-782b-usu3-bbhd
summary
Possible XSS vulnerability with certain configurations of rails-html-sanitizer
## Summary

There is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.

- Versions affected: ALL
- Not affected: NONE
- Fixed versions: 1.4.4


## Impact

A possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags in either of the following ways:

- allow both "math" and "style" elements,
- or allow both "svg" and "style" elements

Code is only impacted if allowed tags are being overridden. Applications may be doing this in four different ways:

1. using application configuration:

  ```ruby
  # In config/application.rb
  config.action_view.sanitized_allowed_tags = ["math", "style"]
  # or
  config.action_view.sanitized_allowed_tags = ["svg", "style"]
  ```

  see https://guides.rubyonrails.org/configuring.html#configuring-action-view

2. using a `:tags` option to the Action View helper `sanitize`:

  ```
  <%= sanitize @comment.body, tags: ["math", "style"] %>
  <%# or %>
  <%= sanitize @comment.body, tags: ["svg", "style"] %>
  ```

  see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitize

3. using Rails::Html::SafeListSanitizer class method `allowed_tags=`:

  ```ruby
  # class-level option
  Rails::Html::SafeListSanitizer.allowed_tags = ["math", "style"]
  # or
  Rails::Html::SafeListSanitizer.allowed_tags = ["svg", "style"]
  ```

4. using a `:tags` options to the Rails::Html::SafeListSanitizer instance method `sanitize`:

  ```ruby
  # instance-level option
  Rails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: ["math", "style"])
  # or
  Rails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: ["svg", "style"])
  ```

All users overriding the allowed tags by any of the above mechanisms to include (("math" or "svg") and "style") should either upgrade or use one of the workarounds immediately.


## Workarounds

Remove "style" from the overridden allowed tags, or remove "math" and "svg" from the overridden allowed tags.


## References

- [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html)
- https://hackerone.com/reports/1656627


## Credit

This vulnerability was responsibly reported by Dominic Breuker.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23519.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23519.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23519
reference_id
reference_type
scores
0
value 0.00139
scoring_system epss
scoring_elements 0.34036
published_at 2026-04-13T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.34059
published_at 2026-04-12T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.34102
published_at 2026-04-11T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.34104
published_at 2026-04-09T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.34073
published_at 2026-04-08T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.34031
published_at 2026-04-07T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34706
published_at 2026-04-04T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.3468
published_at 2026-04-02T12:55:00Z
8
value 0.00148
scoring_system epss
scoring_elements 0.35344
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23519
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23519
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
5
reference_url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-9h9g-93gc-623h
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-9h9g-93gc-623h
6
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23519.yml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23519.yml
7
reference_url https://hackerone.com/reports/1656627
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/1656627
8
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
9
reference_url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23519
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23519
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153
reference_id 1027153
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153744
reference_id 2153744
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153744
13
reference_url https://github.com/advisories/GHSA-9h9g-93gc-623h
reference_id GHSA-9h9g-93gc-623h
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9h9g-93gc-623h
14
reference_url https://access.redhat.com/errata/RHSA-2023:2097
reference_id RHSA-2023:2097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2097
fixed_packages
0
url pkg:gem/rails-html-sanitizer@1.4.4
purl pkg:gem/rails-html-sanitizer@1.4.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-apxn-up79-x3ge
1
vulnerability VCID-cphr-tdzs-x7ar
2
vulnerability VCID-rhb1-h2b8-jucb
3
vulnerability VCID-rz3c-6h7r-6bam
4
vulnerability VCID-ueen-aybd-tqh2
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rails-html-sanitizer@1.4.4
aliases CVE-2022-23519, GHSA-9h9g-93gc-623h, GMS-2022-8299
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-782b-usu3-bbhd
5
url VCID-an3h-1c9y-f3bp
vulnerability_id VCID-an3h-1c9y-f3bp
summary
Moderate severity vulnerability that affects rails-html-sanitizer
Withdrawn, accidental duplicate publish.

Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.
references
0
reference_url https://github.com/advisories/GHSA-mrhj-2g4v-39qx
reference_id
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-mrhj-2g4v-39qx
1
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7579
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-7579
fixed_packages
0
url pkg:gem/rails-html-sanitizer@1.0.3
purl pkg:gem/rails-html-sanitizer@1.0.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63em-3vdj-j3cu
1
vulnerability VCID-782b-usu3-bbhd
2
vulnerability VCID-apxn-up79-x3ge
3
vulnerability VCID-cphr-tdzs-x7ar
4
vulnerability VCID-ete9-xwuw-puf8
5
vulnerability VCID-rhb1-h2b8-jucb
6
vulnerability VCID-rz3c-6h7r-6bam
7
vulnerability VCID-ueen-aybd-tqh2
8
vulnerability VCID-wxfr-bs81-augc
9
vulnerability VCID-xby9-avva-a3e5
10
vulnerability VCID-zcs7-hzze-u3a5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rails-html-sanitizer@1.0.3
aliases GHSA-mrhj-2g4v-39qx
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-an3h-1c9y-f3bp
6
url VCID-apxn-up79-x3ge
vulnerability_id VCID-apxn-up79-x3ge
summary
rails-html-sanitizer has XSS vulnerability with certain configurations
## Summary

There is a possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer 1.6.0 when used with Rails >= 7.1.0.

* Versions affected: 1.6.0
* Not affected: < 1.6.0
* Fixed versions: 1.6.1

## Impact

A possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer may allow an attacker to inject content if HTML5 sanitization is enabled and the application developer has overridden the sanitizer's allowed tags in the following way:

- the "noscript" element is explicitly allowed

Code is only impacted if Rails is configured to use HTML5 sanitization, please see documentation for [`config.action_view.sanitizer_vendor`](https://guides.rubyonrails.org/configuring.html#config-action-view-sanitizer-vendor) and [`config.action_text.sanitizer_vendor`](https://guides.rubyonrails.org/configuring.html#config-action-text-sanitizer-vendor) for more information on these configuration options.

The default configuration is to disallow all of these elements. Code is only impacted if allowed tags are being overridden. Applications may be doing this in a few different ways:

1. using application configuration to configure Action View sanitizers' allowed tags:

  ```ruby
  # In config/application.rb
  config.action_view.sanitized_allowed_tags = ["noscript"]
  ```

  see https://guides.rubyonrails.org/configuring.html#configuring-action-view

2. using a `:tags` option to the Action View helper `sanitize`:

  ```
  <%= sanitize @comment.body, tags: ["noscript"] %>
  ```

  see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitize

3. setting Rails::HTML5::SafeListSanitizer class attribute `allowed_tags`:

  ```ruby
  # class-level option
  Rails::HTML5::SafeListSanitizer.allowed_tags = ["noscript"]
  ```

  (note that this class may also be referenced as `Rails::Html::SafeListSanitizer`)

4. using a `:tags` options to the Rails::HTML5::SafeListSanitizer instance method `sanitize`:

  ```ruby
  # instance-level option
  Rails::HTML5::SafeListSanitizer.new.sanitize(@article.body, tags: ["noscript"])
  ```

  (note that this class may also be referenced as `Rails::Html::SafeListSanitizer`)

5. setting ActionText::ContentHelper module attribute `allowed_tags`:

  ```ruby
  ActionText::ContentHelper.allowed_tags = ["noscript"]
  ```

All users overriding the allowed tags by any of the above mechanisms to include "noscript" should either upgrade or use one of the workarounds.


## Workarounds

Any one of the following actions will work around this issue:

- Remove "noscript" from the overridden allowed tags,
- Or, downgrade sanitization to HTML4 (see documentation for [`config.action_view.sanitizer_vendor`](https://guides.rubyonrails.org/configuring.html#config-action-view-sanitizer-vendor) and [`config.action_text.sanitizer_vendor`](https://guides.rubyonrails.org/configuring.html#config-action-text-sanitizer-vendor) for more information).


## References

- [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html)
- Original report: https://hackerone.com/reports/2509647

## Credit

This vulnerability was responsibly reported by So Sakaguchi ([mokusou](https://hackerone.com/mokusou)) and [taise](https://hackerone.com/taise).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53989.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53989.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-53989
reference_id
reference_type
scores
0
value 0.01691
scoring_system epss
scoring_elements 0.82267
published_at 2026-04-16T12:55:00Z
1
value 0.01691
scoring_system epss
scoring_elements 0.8223
published_at 2026-04-13T12:55:00Z
2
value 0.01691
scoring_system epss
scoring_elements 0.82236
published_at 2026-04-12T12:55:00Z
3
value 0.01691
scoring_system epss
scoring_elements 0.82244
published_at 2026-04-11T12:55:00Z
4
value 0.01691
scoring_system epss
scoring_elements 0.82224
published_at 2026-04-09T12:55:00Z
5
value 0.01691
scoring_system epss
scoring_elements 0.82217
published_at 2026-04-08T12:55:00Z
6
value 0.01691
scoring_system epss
scoring_elements 0.82191
published_at 2026-04-07T12:55:00Z
7
value 0.01691
scoring_system epss
scoring_elements 0.82195
published_at 2026-04-04T12:55:00Z
8
value 0.01691
scoring_system epss
scoring_elements 0.82174
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-53989
2
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
3
reference_url https://github.com/rails/rails-html-sanitizer/commit/16251735e36ebdc302e2f90f2a39cad56879414f
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
1
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T14:35:22Z/
url https://github.com/rails/rails-html-sanitizer/commit/16251735e36ebdc302e2f90f2a39cad56879414f
4
reference_url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-rxv5-gxqc-xx8g
reference_id
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
1
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
2
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
3
value LOW
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T14:35:22Z/
url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-rxv5-gxqc-xx8g
5
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2024-53989.yml
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2024-53989.yml
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-53989
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-53989
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2330055
reference_id 2330055
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2330055
8
reference_url https://github.com/advisories/GHSA-rxv5-gxqc-xx8g
reference_id GHSA-rxv5-gxqc-xx8g
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rxv5-gxqc-xx8g
fixed_packages
0
url pkg:gem/rails-html-sanitizer@1.6.1
purl pkg:gem/rails-html-sanitizer@1.6.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rails-html-sanitizer@1.6.1
aliases CVE-2024-53989, GHSA-rxv5-gxqc-xx8g
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-apxn-up79-x3ge
7
url VCID-cphr-tdzs-x7ar
vulnerability_id VCID-cphr-tdzs-x7ar
summary
rails-html-sanitize has XSS vulnerability with certain configurations
## Summary

There is a possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer 1.6.0 when used with Rails >= 7.1.0 and Nokogiri < 1.15.7, or 1.16.x < 1.16.8.

* Versions affected: 1.6.0
* Not affected: < 1.6.0
* Fixed versions: 1.6.1

Please note that the fix in v1.6.1 is to update the dependency on Nokogiri to 1.15.7 or >= 1.16.8.


## Impact

A possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer may allow an attacker to inject content if HTML5 sanitization is enabled and the application developer has overridden the sanitizer's allowed tags in either of the following ways:

* allow both "math" and "style" elements
* or allow both "svg" and "style" elements

Code is only impacted if Rails is configured to use HTML5 sanitization, please see documentation for [`config.action_view.sanitizer_vendor`](https://guides.rubyonrails.org/configuring.html#config-action-view-sanitizer-vendor) and [`config.action_text.sanitizer_vendor`](https://guides.rubyonrails.org/configuring.html#config-action-text-sanitizer-vendor) for more information on these configuration options.

Code is only impacted if allowed tags are being overridden. Applications may be doing this in a few different ways:

1. using application configuration to configure Action View sanitizers' allowed tags:

  ```ruby
  # In config/application.rb
  config.action_view.sanitized_allowed_tags = ["math", "style"]
  # or
  config.action_view.sanitized_allowed_tags = ["svg", "style"]
  ```

  see https://guides.rubyonrails.org/configuring.html#configuring-action-view

2. using a `:tags` option to the Action View helper `sanitize`:

  ```
  <%= sanitize @comment.body, tags: ["math", "style"] %>
  <%# or %>
  <%= sanitize @comment.body, tags: ["svg", "style"] %>
  ```

  see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitize

3. setting Rails::HTML5::SafeListSanitizer class attribute `allowed_tags`:

  ```ruby
  # class-level option
  Rails::HTML5::SafeListSanitizer.allowed_tags = ["math", "style"]
  # or
  Rails::HTML5::SafeListSanitizer.allowed_tags = ["svg", "style"]
  ```

  (note that this class may also be referenced as `Rails::Html::SafeListSanitizer`)

4. using a `:tags` options to the Rails::HTML5::SafeListSanitizer instance method `sanitize`:

  ```ruby
  # instance-level option
  Rails::HTML5::SafeListSanitizer.new.sanitize(@article.body, tags: ["math", "style"])
  # or
  Rails::HTML5::SafeListSanitizer.new.sanitize(@article.body, tags: ["svg", "style"])
  ```

  (note that this class may also be referenced as `Rails::Html::SafeListSanitizer`)

5. setting ActionText::ContentHelper module attribute `allowed_tags`:

  ```ruby
  ActionText::ContentHelper.allowed_tags = ["math", "style"]
  # or
  ActionText::ContentHelper.allowed_tags = ["svg", "style"]
  ```

All users overriding the allowed tags by any of the above mechanisms to include (("math" or "svg") and "style") should either upgrade or use one of the workarounds.


## Workarounds

Any one of the following actions will work around this issue:

- Remove "style" from the overridden allowed tags,
- Or, remove "math" and "svg" from the overridden allowed tags,
- Or, downgrade sanitization to HTML4 (see documentation for [`config.action_view.sanitizer_vendor`](https://guides.rubyonrails.org/configuring.html#config-action-view-sanitizer-vendor) and [`config.action_text.sanitizer_vendor`](https://guides.rubyonrails.org/configuring.html#config-action-text-sanitizer-vendor) for more information)
- Or, independently upgrade Nokogiri to v1.15.7 or >= 1.16.8.


## References

- [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html)
- Original report: https://hackerone.com/reports/2503220


## Credit

This vulnerability was responsibly reported by So Sakaguchi ([mokusou](https://hackerone.com/mokusou)) and [taise](https://hackerone.com/taise).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53985.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53985.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-53985
reference_id
reference_type
scores
0
value 0.01627
scoring_system epss
scoring_elements 0.81905
published_at 2026-04-16T12:55:00Z
1
value 0.01627
scoring_system epss
scoring_elements 0.81869
published_at 2026-04-13T12:55:00Z
2
value 0.01627
scoring_system epss
scoring_elements 0.81874
published_at 2026-04-12T12:55:00Z
3
value 0.01627
scoring_system epss
scoring_elements 0.81886
published_at 2026-04-11T12:55:00Z
4
value 0.01627
scoring_system epss
scoring_elements 0.81867
published_at 2026-04-09T12:55:00Z
5
value 0.01627
scoring_system epss
scoring_elements 0.8186
published_at 2026-04-08T12:55:00Z
6
value 0.01627
scoring_system epss
scoring_elements 0.81834
published_at 2026-04-07T12:55:00Z
7
value 0.01627
scoring_system epss
scoring_elements 0.81837
published_at 2026-04-04T12:55:00Z
8
value 0.01627
scoring_system epss
scoring_elements 0.81813
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-53985
2
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
3
reference_url https://github.com/rails/rails-html-sanitizer/commit/b0220b8850d52199a15f83c472d175a4122dd7b1
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T16:47:47Z/
url https://github.com/rails/rails-html-sanitizer/commit/b0220b8850d52199a15f83c472d175a4122dd7b1
4
reference_url https://github.com/rails/rails-html-sanitizer/commit/cd18b0ef00aad1d4a9e1c5d860cd23f80f63c505
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T16:47:47Z/
url https://github.com/rails/rails-html-sanitizer/commit/cd18b0ef00aad1d4a9e1c5d860cd23f80f63c505
5
reference_url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-w8gc-x259-rc7x
reference_id
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
1
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T16:47:47Z/
url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-w8gc-x259-rc7x
6
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2024-53985.yml
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2024-53985.yml
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-53985
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-53985
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2330061
reference_id 2330061
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2330061
9
reference_url https://github.com/advisories/GHSA-w8gc-x259-rc7x
reference_id GHSA-w8gc-x259-rc7x
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-w8gc-x259-rc7x
fixed_packages
0
url pkg:gem/rails-html-sanitizer@1.6.1
purl pkg:gem/rails-html-sanitizer@1.6.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rails-html-sanitizer@1.6.1
aliases CVE-2024-53985, GHSA-w8gc-x259-rc7x
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cphr-tdzs-x7ar
8
url VCID-ete9-xwuw-puf8
vulnerability_id VCID-ete9-xwuw-puf8
summary
Rails::Html::Sanitizer vulnerable to Cross-site Scripting
Versions of Rails::Html::Sanitizer prior to version 1.4.3 are vulnerable to XSS with certain configurations of Rails::Html::Sanitizer which  allows an attacker to inject content when the application developer has overridden the sanitizer's allowed tags to allow both `select` and `style` elements. Code is only impacted if allowed tags are being overridden. 

This may be done via application configuration: ```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = ["select", "style"]```

see https://guides.rubyonrails.org/configuring.html#configuring-action-view

Or it may be done with a `:tags` option to the Action View helper `sanitize`: ```<%= sanitize @comment.body, tags: ["select", "style"] %>``` 

see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitize 

It may also be done with Rails::Html::SafeListSanitizer directly: 
```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = ["select", "style"]```  or with
```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: ["select", "style"])```

All users overriding the allowed tags by any of the above mechanisms to include both "select" and "style" are recommended to upgrade immediately. A workaround for this issue can be applied by removing either `select` or `style` from the overridden allowed tags.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32209.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32209.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32209
reference_id
reference_type
scores
0
value 0.04566
scoring_system epss
scoring_elements 0.89217
published_at 2026-04-16T12:55:00Z
1
value 0.04566
scoring_system epss
scoring_elements 0.89204
published_at 2026-04-13T12:55:00Z
2
value 0.04566
scoring_system epss
scoring_elements 0.89207
published_at 2026-04-12T12:55:00Z
3
value 0.04566
scoring_system epss
scoring_elements 0.89211
published_at 2026-04-11T12:55:00Z
4
value 0.04566
scoring_system epss
scoring_elements 0.892
published_at 2026-04-09T12:55:00Z
5
value 0.04566
scoring_system epss
scoring_elements 0.89196
published_at 2026-04-08T12:55:00Z
6
value 0.04566
scoring_system epss
scoring_elements 0.89178
published_at 2026-04-07T12:55:00Z
7
value 0.04686
scoring_system epss
scoring_elements 0.89321
published_at 2026-04-04T12:55:00Z
8
value 0.04686
scoring_system epss
scoring_elements 0.89307
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32209
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32209
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
5
reference_url https://github.com/rails/rails-html-sanitizer/commit/45a5c10fed3d9aa141594c80afa06d748fa0967d
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer/commit/45a5c10fed3d9aa141594c80afa06d748fa0967d
6
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-32209.yml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-32209.yml
7
reference_url https://groups.google.com/g/rubyonrails-security/c/ce9PhUANQ6s
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/rubyonrails-security/c/ce9PhUANQ6s
8
reference_url https://hackerone.com/reports/1530898
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/1530898
9
reference_url https://lists.debian.org/debian-lts-announce/2022/12/msg00012.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/12/msg00012.html
10
reference_url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGRLWBEB3S5AU3D4TTROIS7O6QPHDTRH
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGRLWBEB3S5AU3D4TTROIS7O6QPHDTRH
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NHDACMCLWE32BZZTSNWQPIFUAD5I6Q47
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NHDACMCLWE32BZZTSNWQPIFUAD5I6Q47
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGRLWBEB3S5AU3D4TTROIS7O6QPHDTRH
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGRLWBEB3S5AU3D4TTROIS7O6QPHDTRH
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NHDACMCLWE32BZZTSNWQPIFUAD5I6Q47
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NHDACMCLWE32BZZTSNWQPIFUAD5I6Q47
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-32209
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-32209
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013806
reference_id 1013806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013806
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2101882
reference_id 2101882
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2101882
18
reference_url https://github.com/advisories/GHSA-pg8v-g4xq-hww9
reference_id GHSA-pg8v-g4xq-hww9
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pg8v-g4xq-hww9
19
reference_url https://access.redhat.com/errata/RHSA-2022:8506
reference_id RHSA-2022:8506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8506
fixed_packages
0
url pkg:gem/rails-html-sanitizer@1.4.3
purl pkg:gem/rails-html-sanitizer@1.4.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63em-3vdj-j3cu
1
vulnerability VCID-782b-usu3-bbhd
2
vulnerability VCID-apxn-up79-x3ge
3
vulnerability VCID-cphr-tdzs-x7ar
4
vulnerability VCID-rhb1-h2b8-jucb
5
vulnerability VCID-rz3c-6h7r-6bam
6
vulnerability VCID-ueen-aybd-tqh2
7
vulnerability VCID-wxfr-bs81-augc
8
vulnerability VCID-zcs7-hzze-u3a5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rails-html-sanitizer@1.4.3
aliases CVE-2022-32209, GHSA-pg8v-g4xq-hww9
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ete9-xwuw-puf8
9
url VCID-nc6s-6usd-gkeb
vulnerability_id VCID-nc6s-6usd-gkeb
summary
Possible XSS vulnerability
Certain attributes are not removed from tags when they are sanitized, and these attributes can lead to an XSS attack on target applications.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7578
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.37741
published_at 2026-04-16T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37592
published_at 2026-04-01T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.37774
published_at 2026-04-02T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.378
published_at 2026-04-04T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37679
published_at 2026-04-07T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.37729
published_at 2026-04-08T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.37742
published_at 2026-04-09T12:55:00Z
7
value 0.00166
scoring_system epss
scoring_elements 0.37755
published_at 2026-04-11T12:55:00Z
8
value 0.00166
scoring_system epss
scoring_elements 0.3772
published_at 2026-04-12T12:55:00Z
9
value 0.00166
scoring_system epss
scoring_elements 0.37693
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7578
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7578
7
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
8
reference_url https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4
9
reference_url https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ
10
reference_url https://groups.google.com/forum/#!topic/rubyonrails-security/uh--W4TDwmI
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements
url https://groups.google.com/forum/#!topic/rubyonrails-security/uh--W4TDwmI
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7578
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-7578
12
reference_url https://web.archive.org/web/20160128075017/http://www.securitytracker.com/id/1034816
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20160128075017/http://www.securitytracker.com/id/1034816
13
reference_url http://www.openwall.com/lists/oss-security/2016/01/25/11
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2016/01/25/11
14
reference_url http://www.securitytracker.com/id/1034816
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034816
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812814
reference_id 812814
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812814
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:html_sanitizer:*:*:*:*:*:ruby:*:*
reference_id cpe:2.3:a:rubyonrails:html_sanitizer:*:*:*:*:*:ruby:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:html_sanitizer:*:*:*:*:*:ruby:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.6:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.6:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.6:rc1:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta1.1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:5.0.0:beta1.1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta1.1:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:5.0.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta2:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:5.0.0:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta3:*:*:*:*:*:*
45
reference_url https://github.com/advisories/GHSA-59c7-4xj2-hgvw
reference_id GHSA-59c7-4xj2-hgvw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-59c7-4xj2-hgvw
fixed_packages
0
url pkg:gem/rails-html-sanitizer@1.0.3
purl pkg:gem/rails-html-sanitizer@1.0.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63em-3vdj-j3cu
1
vulnerability VCID-782b-usu3-bbhd
2
vulnerability VCID-apxn-up79-x3ge
3
vulnerability VCID-cphr-tdzs-x7ar
4
vulnerability VCID-ete9-xwuw-puf8
5
vulnerability VCID-rhb1-h2b8-jucb
6
vulnerability VCID-rz3c-6h7r-6bam
7
vulnerability VCID-ueen-aybd-tqh2
8
vulnerability VCID-wxfr-bs81-augc
9
vulnerability VCID-xby9-avva-a3e5
10
vulnerability VCID-zcs7-hzze-u3a5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rails-html-sanitizer@1.0.3
aliases CVE-2015-7578, GHSA-59c7-4xj2-hgvw
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nc6s-6usd-gkeb
10
url VCID-rhb1-h2b8-jucb
vulnerability_id VCID-rhb1-h2b8-jucb
summary
rails-html-sanitizer has XSS vulnerability with certain configurations
## Summary

There is a possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer 1.6.0 when used with Rails >= 7.1.0.

* Versions affected: 1.6.0
* Not affected: < 1.6.0
* Fixed versions: 1.6.1

## Impact

A possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer may allow an attacker to inject content if HTML5 sanitization is enabled and the application developer has overridden the sanitizer's allowed tags in the following way:

- the "style" element is explicitly allowed
- the "svg" or "math" element is not allowed

Code is only impacted if Rails is configured to use HTML5 sanitization, please see documentation for [`config.action_view.sanitizer_vendor`](https://guides.rubyonrails.org/configuring.html#config-action-view-sanitizer-vendor) and [`config.action_text.sanitizer_vendor`](https://guides.rubyonrails.org/configuring.html#config-action-text-sanitizer-vendor) for more information on these configuration options.

The default configuration is to disallow all of these elements. Code is only impacted if allowed tags are being overridden. Applications may be doing this in a few different ways:

1. using application configuration to configure Action View sanitizers' allowed tags:

  ```ruby
  # In config/application.rb
  config.action_view.sanitized_allowed_tags = ["style"]
  ```

  see https://guides.rubyonrails.org/configuring.html#configuring-action-view

2. using a `:tags` option to the Action View helper `sanitize`:

  ```
  <%= sanitize @comment.body, tags: ["style"] %>
  ```

  see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitize

3. setting Rails::HTML5::SafeListSanitizer class attribute `allowed_tags`:

  ```ruby
  # class-level option
  Rails::HTML5::SafeListSanitizer.allowed_tags = ["style"]
  ```

  (note that this class may also be referenced as `Rails::Html::SafeListSanitizer`)

4. using a `:tags` options to the Rails::HTML5::SafeListSanitizer instance method `sanitize`:

  ```ruby
  # instance-level option
  Rails::HTML5::SafeListSanitizer.new.sanitize(@article.body, tags: ["style"])
  ```

  (note that this class may also be referenced as `Rails::Html::SafeListSanitizer`)

5. setting ActionText::ContentHelper module attribute `allowed_tags`:

  ```ruby
  ActionText::ContentHelper.allowed_tags = ["style"]
  ```

All users overriding the allowed tags by any of the above mechanisms to include "style" and omit "svg" or "math" should either upgrade or use one of the workarounds.


## Workarounds

Any one of the following actions will work around this issue:

- Remove "style" from the overridden allowed tags,
- Or, downgrade sanitization to HTML4 (see documentation for [`config.action_view.sanitizer_vendor`](https://guides.rubyonrails.org/configuring.html#config-action-view-sanitizer-vendor) and [`config.action_text.sanitizer_vendor`](https://guides.rubyonrails.org/configuring.html#config-action-text-sanitizer-vendor) for more information).


## References

- [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html)
- Original report: https://hackerone.com/reports/2519936

## Credit

This vulnerability was responsibly reported by So Sakaguchi ([mokusou](https://hackerone.com/mokusou)) and [taise](https://hackerone.com/taise).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53987.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53987.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-53987
reference_id
reference_type
scores
0
value 0.01458
scoring_system epss
scoring_elements 0.80863
published_at 2026-04-16T12:55:00Z
1
value 0.01458
scoring_system epss
scoring_elements 0.80799
published_at 2026-04-04T12:55:00Z
2
value 0.01458
scoring_system epss
scoring_elements 0.80823
published_at 2026-04-08T12:55:00Z
3
value 0.01458
scoring_system epss
scoring_elements 0.80796
published_at 2026-04-07T12:55:00Z
4
value 0.01458
scoring_system epss
scoring_elements 0.80779
published_at 2026-04-02T12:55:00Z
5
value 0.01458
scoring_system epss
scoring_elements 0.80826
published_at 2026-04-13T12:55:00Z
6
value 0.01458
scoring_system epss
scoring_elements 0.80834
published_at 2026-04-12T12:55:00Z
7
value 0.01458
scoring_system epss
scoring_elements 0.80848
published_at 2026-04-11T12:55:00Z
8
value 0.01458
scoring_system epss
scoring_elements 0.80832
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-53987
2
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
3
reference_url https://github.com/rails/rails-html-sanitizer/commit/f02ffbb8465e73920b6de0da940f5530f855965e
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T14:33:13Z/
url https://github.com/rails/rails-html-sanitizer/commit/f02ffbb8465e73920b6de0da940f5530f855965e
4
reference_url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-2x5m-9ch4-qgrr
reference_id
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
1
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T14:33:13Z/
url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-2x5m-9ch4-qgrr
5
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2024-53987.yml
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2024-53987.yml
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-53987
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-53987
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2330053
reference_id 2330053
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2330053
8
reference_url https://github.com/advisories/GHSA-2x5m-9ch4-qgrr
reference_id GHSA-2x5m-9ch4-qgrr
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2x5m-9ch4-qgrr
fixed_packages
0
url pkg:gem/rails-html-sanitizer@1.6.1
purl pkg:gem/rails-html-sanitizer@1.6.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rails-html-sanitizer@1.6.1
aliases CVE-2024-53987, GHSA-2x5m-9ch4-qgrr
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rhb1-h2b8-jucb
11
url VCID-rz3c-6h7r-6bam
vulnerability_id VCID-rz3c-6h7r-6bam
summary
rails-html-sanitizer has XSS vulnerability with certain configurations
## Summary

There is a possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer 1.6.0 when used with Rails >= 7.1.0.

* Versions affected: 1.6.0
* Not affected: < 1.6.0
* Fixed versions: 1.6.1

## Impact

A possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer may allow an attacker to inject content if HTML5 sanitization is enabled and the application developer has overridden the sanitizer's allowed tags in the following way:

- the "math", "mtext", "table", and "style" elements are allowed
- and either "mglyph" or "malignmark" are allowed

Code is only impacted if Rails is configured to use HTML5 sanitization, please see documentation for [`config.action_view.sanitizer_vendor`](https://guides.rubyonrails.org/configuring.html#config-action-view-sanitizer-vendor) and [`config.action_text.sanitizer_vendor`](https://guides.rubyonrails.org/configuring.html#config-action-text-sanitizer-vendor) for more information on these configuration options.

The default configuration is to disallow all of these elements except for "table". Code is only impacted if allowed tags are being overridden. Applications may be doing this in a few different ways:

1. using application configuration to configure Action View sanitizers' allowed tags:

  ```ruby
  # In config/application.rb
  config.action_view.sanitized_allowed_tags = ["math", "mtext", "table", "style", "mglyph"]
  # or
  config.action_view.sanitized_allowed_tags = ["math", "mtext", "table", "style", "malignmark"]
  ```

  see https://guides.rubyonrails.org/configuring.html#configuring-action-view

2. using a `:tags` option to the Action View helper `sanitize`:

  ```
  <%= sanitize @comment.body, tags: ["math", "mtext", "table", "style", "mglyph"] %>
  <%# or %>
  <%= sanitize @comment.body, tags: ["math", "mtext", "table", "style", "malignmark"] %>
  ```

  see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitize

3. setting Rails::HTML5::SafeListSanitizer class attribute `allowed_tags`:

  ```ruby
  # class-level option
  Rails::HTML5::SafeListSanitizer.allowed_tags = ["math", "mtext", "table", "style", "mglyph"]
  # or
  Rails::HTML5::SafeListSanitizer.allowed_tags = ["math", "mtext", "table", "style", "malignmark"]
  ```

  (note that this class may also be referenced as `Rails::Html::SafeListSanitizer`)

4. using a `:tags` options to the Rails::HTML5::SafeListSanitizer instance method `sanitize`:

  ```ruby
  # instance-level option
  Rails::HTML5::SafeListSanitizer.new.sanitize(@article.body, tags: ["math", "mtext", "table", "style", "mglyph"])
  # or
  Rails::HTML5::SafeListSanitizer.new.sanitize(@article.body, tags: ["math", "mtext", "table", "style", "malignmark"])
  ```

  (note that this class may also be referenced as `Rails::Html::SafeListSanitizer`)

5. setting ActionText::ContentHelper module attribute `allowed_tags`:

  ```ruby
  ActionText::ContentHelper.allowed_tags = ["math", "mtext", "table", "style", "mglyph"]
  # or
  ActionText::ContentHelper.allowed_tags = ["math", "mtext", "table", "style", "malignmark"]
  ```

All users overriding the allowed tags by any of the above mechanisms to include ("math" and "mtext" and "table" and "style" and ("mglyph" or "malignmark")) should either upgrade or use one of the workarounds.


## Workarounds

Any one of the following actions will work around this issue:

- Remove "mglyph" and "malignmark" from the overridden allowed tags,
- Or, downgrade sanitization to HTML4 (see documentation for [`config.action_view.sanitizer_vendor`](https://guides.rubyonrails.org/configuring.html#config-action-view-sanitizer-vendor) and [`config.action_text.sanitizer_vendor`](https://guides.rubyonrails.org/configuring.html#config-action-text-sanitizer-vendor) for more information).


## References

- [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html)
- Original report: https://hackerone.com/reports/2519936

## Credit

This vulnerability was responsibly reported by So Sakaguchi ([mokusou](https://hackerone.com/mokusou)) and [taise](https://hackerone.com/taise).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53988.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53988.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-53988
reference_id
reference_type
scores
0
value 0.01691
scoring_system epss
scoring_elements 0.82267
published_at 2026-04-16T12:55:00Z
1
value 0.01691
scoring_system epss
scoring_elements 0.8223
published_at 2026-04-13T12:55:00Z
2
value 0.01691
scoring_system epss
scoring_elements 0.82236
published_at 2026-04-12T12:55:00Z
3
value 0.01691
scoring_system epss
scoring_elements 0.82244
published_at 2026-04-11T12:55:00Z
4
value 0.01691
scoring_system epss
scoring_elements 0.82174
published_at 2026-04-02T12:55:00Z
5
value 0.01691
scoring_system epss
scoring_elements 0.82217
published_at 2026-04-08T12:55:00Z
6
value 0.01691
scoring_system epss
scoring_elements 0.82191
published_at 2026-04-07T12:55:00Z
7
value 0.01691
scoring_system epss
scoring_elements 0.82195
published_at 2026-04-04T12:55:00Z
8
value 0.01691
scoring_system epss
scoring_elements 0.82224
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-53988
2
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
3
reference_url https://github.com/rails/rails-html-sanitizer/commit/a0a3e8b76b696446ffc6bffcff3bc7b7c6393c72
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T14:34:13Z/
url https://github.com/rails/rails-html-sanitizer/commit/a0a3e8b76b696446ffc6bffcff3bc7b7c6393c72
4
reference_url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-cfjx-w229-hgx5
reference_id
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
1
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T14:34:13Z/
url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-cfjx-w229-hgx5
5
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2024-53988.yml
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2024-53988.yml
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-53988
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-53988
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2330067
reference_id 2330067
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2330067
8
reference_url https://github.com/advisories/GHSA-cfjx-w229-hgx5
reference_id GHSA-cfjx-w229-hgx5
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-cfjx-w229-hgx5
fixed_packages
0
url pkg:gem/rails-html-sanitizer@1.6.1
purl pkg:gem/rails-html-sanitizer@1.6.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rails-html-sanitizer@1.6.1
aliases CVE-2024-53988, GHSA-cfjx-w229-hgx5
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rz3c-6h7r-6bam
12
url VCID-ueen-aybd-tqh2
vulnerability_id VCID-ueen-aybd-tqh2
summary
rails-html-sanitizer has XSS vulnerability with certain configurations
## Summary

There is a possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer 1.6.0 when used with Rails >= 7.1.0.

* Versions affected: 1.6.0
* Not affected: < 1.6.0
* Fixed versions: 1.6.1

## Impact

A possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer may allow an attacker to inject content if HTML5 sanitization is enabled and the application developer has overridden the sanitizer's allowed tags in the following way:

- the "math" and "style" elements are both explicitly allowed

Code is only impacted if Rails is configured to use HTML5 sanitization, please see documentation for [`config.action_view.sanitizer_vendor`](https://guides.rubyonrails.org/configuring.html#config-action-view-sanitizer-vendor) and [`config.action_text.sanitizer_vendor`](https://guides.rubyonrails.org/configuring.html#config-action-text-sanitizer-vendor) for more information on these configuration options.

The default configuration is to disallow these elements. Code is only impacted if allowed tags are being overridden. Applications may be doing this in a few different ways:

1. using application configuration to configure Action View sanitizers' allowed tags:

  ```ruby
  # In config/application.rb
  config.action_view.sanitized_allowed_tags = ["math", "style"]
  ```

  see https://guides.rubyonrails.org/configuring.html#configuring-action-view

2. using a `:tags` option to the Action View helper `sanitize`:

  ```
  <%= sanitize @comment.body, tags: ["math", "style"] %>
  ```

  see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitize

3. setting Rails::HTML5::SafeListSanitizer class attribute `allowed_tags`:

  ```ruby
  # class-level option
  Rails::HTML5::SafeListSanitizer.allowed_tags = ["math", "style"]
  ```

  (note that this class may also be referenced as `Rails::Html::SafeListSanitizer`)

4. using a `:tags` options to the Rails::HTML5::SafeListSanitizer instance method `sanitize`:

  ```ruby
  # instance-level option
  Rails::HTML5::SafeListSanitizer.new.sanitize(@article.body, tags: ["math", "style"])
  ```

  (note that this class may also be referenced as `Rails::Html::SafeListSanitizer`)

5. setting ActionText::ContentHelper module attribute `allowed_tags`:

  ```ruby
  ActionText::ContentHelper.allowed_tags = ["math", "style"]
  ```

All users overriding the allowed tags by any of the above mechanisms to include both "math" and "style" should either upgrade or use one of the workarounds.


## Workarounds

Any one of the following actions will work around this issue:

- Remove "math" or "style" from the overridden allowed tags,
- Or, downgrade sanitization to HTML4 (see documentation for [`config.action_view.sanitizer_vendor`](https://guides.rubyonrails.org/configuring.html#config-action-view-sanitizer-vendor) and [`config.action_text.sanitizer_vendor`](https://guides.rubyonrails.org/configuring.html#config-action-text-sanitizer-vendor) for more information).


## References

- [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html)
- Original report: https://hackerone.com/reports/2519941

## Credit

This vulnerability was responsibly reported by So Sakaguchi ([mokusou](https://hackerone.com/mokusou)) and [taise](https://hackerone.com/taise).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53986.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53986.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-53986
reference_id
reference_type
scores
0
value 0.01968
scoring_system epss
scoring_elements 0.83559
published_at 2026-04-16T12:55:00Z
1
value 0.01968
scoring_system epss
scoring_elements 0.83525
published_at 2026-04-13T12:55:00Z
2
value 0.01968
scoring_system epss
scoring_elements 0.83529
published_at 2026-04-12T12:55:00Z
3
value 0.01968
scoring_system epss
scoring_elements 0.83487
published_at 2026-04-04T12:55:00Z
4
value 0.01968
scoring_system epss
scoring_elements 0.83473
published_at 2026-04-02T12:55:00Z
5
value 0.01968
scoring_system epss
scoring_elements 0.83486
published_at 2026-04-07T12:55:00Z
6
value 0.01968
scoring_system epss
scoring_elements 0.83511
published_at 2026-04-08T12:55:00Z
7
value 0.01968
scoring_system epss
scoring_elements 0.83535
published_at 2026-04-11T12:55:00Z
8
value 0.01968
scoring_system epss
scoring_elements 0.8352
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-53986
2
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
3
reference_url https://github.com/rails/rails-html-sanitizer/commit/f02ffbb8465e73920b6de0da940f5530f855965e
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T14:33:42Z/
url https://github.com/rails/rails-html-sanitizer/commit/f02ffbb8465e73920b6de0da940f5530f855965e
4
reference_url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-638j-pmjw-jq48
reference_id
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
1
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T14:33:42Z/
url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-638j-pmjw-jq48
5
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2024-53986.yml
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2024-53986.yml
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-53986
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-53986
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2330056
reference_id 2330056
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2330056
8
reference_url https://github.com/advisories/GHSA-638j-pmjw-jq48
reference_id GHSA-638j-pmjw-jq48
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-638j-pmjw-jq48
fixed_packages
0
url pkg:gem/rails-html-sanitizer@1.6.1
purl pkg:gem/rails-html-sanitizer@1.6.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rails-html-sanitizer@1.6.1
aliases CVE-2024-53986, GHSA-638j-pmjw-jq48
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ueen-aybd-tqh2
13
url VCID-ujza-s7ug-9fcp
vulnerability_id VCID-ujza-s7ug-9fcp
summary
XSS vulnerability in strip_tags
Due to the way that `Rails::Html::FullSanitizer` is implemented, if an attacker passes an already escaped HTML entity to the input of Action View's `strip_tags` these entities will be unescaped what may cause a XSS attack if used in combination with `raw` or `html_safe`.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7579
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.37592
published_at 2026-04-01T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37741
published_at 2026-04-16T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.37693
published_at 2026-04-13T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.3772
published_at 2026-04-12T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37755
published_at 2026-04-11T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.37742
published_at 2026-04-09T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.37729
published_at 2026-04-08T12:55:00Z
7
value 0.00166
scoring_system epss
scoring_elements 0.37679
published_at 2026-04-07T12:55:00Z
8
value 0.00166
scoring_system epss
scoring_elements 0.378
published_at 2026-04-04T12:55:00Z
9
value 0.00166
scoring_system epss
scoring_elements 0.37774
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7579
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7579
7
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
8
reference_url https://github.com/rails/rails-html-sanitizer/commit/49dfc1584c5b8e35a4ffabf8356ba3df025e8d3f
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer/commit/49dfc1584c5b8e35a4ffabf8356ba3df025e8d3f
9
reference_url https://groups.google.com/forum/message/raw?msg=ruby-security-ann/OU9ugTZcbjc/uksRkSxZEgAJ
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/message/raw?msg=ruby-security-ann/OU9ugTZcbjc/uksRkSxZEgAJ
10
reference_url https://groups.google.com/forum/#!topic/rubyonrails-security/OU9ugTZcbjc
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements
url https://groups.google.com/forum/#!topic/rubyonrails-security/OU9ugTZcbjc
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7579
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-7579
12
reference_url https://web.archive.org/web/20160128075017/http://www.securitytracker.com/id/1034816
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20160128075017/http://www.securitytracker.com/id/1034816
13
reference_url http://www.openwall.com/lists/oss-security/2016/01/25/12
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2016/01/25/12
14
reference_url http://www.securitytracker.com/id/1034816
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034816
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812814
reference_id 812814
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812814
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:html_sanitizer:*:*:*:*:*:ruby:*:*
reference_id cpe:2.3:a:rubyonrails:html_sanitizer:*:*:*:*:*:ruby:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:html_sanitizer:*:*:*:*:*:ruby:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.6:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:4.2.6:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:4.2.6:rc1:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta1.1:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:5.0.0:beta1.1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta1.1:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:5.0.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta2:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:rubyonrails:rails:5.0.0:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rubyonrails:rails:5.0.0:beta3:*:*:*:*:*:*
45
reference_url https://github.com/advisories/GHSA-r9c2-cr39-c8g6
reference_id GHSA-r9c2-cr39-c8g6
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r9c2-cr39-c8g6
fixed_packages
0
url pkg:gem/rails-html-sanitizer@1.0.3
purl pkg:gem/rails-html-sanitizer@1.0.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63em-3vdj-j3cu
1
vulnerability VCID-782b-usu3-bbhd
2
vulnerability VCID-apxn-up79-x3ge
3
vulnerability VCID-cphr-tdzs-x7ar
4
vulnerability VCID-ete9-xwuw-puf8
5
vulnerability VCID-rhb1-h2b8-jucb
6
vulnerability VCID-rz3c-6h7r-6bam
7
vulnerability VCID-ueen-aybd-tqh2
8
vulnerability VCID-wxfr-bs81-augc
9
vulnerability VCID-xby9-avva-a3e5
10
vulnerability VCID-zcs7-hzze-u3a5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rails-html-sanitizer@1.0.3
aliases CVE-2015-7579, GHSA-r9c2-cr39-c8g6
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ujza-s7ug-9fcp
14
url VCID-xby9-avva-a3e5
vulnerability_id VCID-xby9-avva-a3e5
summary
XSS vulnerability
The gem allows attributes that are not specified in the allowlist to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3741.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3741.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3741
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.32321
published_at 2026-04-16T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.32284
published_at 2026-04-13T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.32312
published_at 2026-04-12T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.3235
published_at 2026-04-11T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32349
published_at 2026-04-09T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.3232
published_at 2026-04-08T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.32271
published_at 2026-04-07T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32257
published_at 2026-04-01T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.32408
published_at 2026-04-02T12:55:00Z
9
value 0.00129
scoring_system epss
scoring_elements 0.32444
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3741
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3741
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
5
reference_url https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae
6
reference_url https://groups.google.com/d/msg/rubyonrails-security/tP7W3kLc5u4/uDy2Br7xBgAJ
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements
url https://groups.google.com/d/msg/rubyonrails-security/tP7W3kLc5u4/uDy2Br7xBgAJ
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3741
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-3741
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568842
reference_id 1568842
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568842
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893994
reference_id 893994
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893994
10
reference_url https://github.com/advisories/GHSA-px3r-jm9g-c8w8
reference_id GHSA-px3r-jm9g-c8w8
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-px3r-jm9g-c8w8
fixed_packages
0
url pkg:gem/rails-html-sanitizer@1.0.4
purl pkg:gem/rails-html-sanitizer@1.0.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63em-3vdj-j3cu
1
vulnerability VCID-782b-usu3-bbhd
2
vulnerability VCID-apxn-up79-x3ge
3
vulnerability VCID-cphr-tdzs-x7ar
4
vulnerability VCID-ete9-xwuw-puf8
5
vulnerability VCID-rhb1-h2b8-jucb
6
vulnerability VCID-rz3c-6h7r-6bam
7
vulnerability VCID-ueen-aybd-tqh2
8
vulnerability VCID-wxfr-bs81-augc
9
vulnerability VCID-zcs7-hzze-u3a5
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rails-html-sanitizer@1.0.4
aliases CVE-2018-3741, GHSA-px3r-jm9g-c8w8
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xby9-avva-a3e5
15
url VCID-zcs7-hzze-u3a5
vulnerability_id VCID-zcs7-hzze-u3a5
summary
Possible XSS vulnerability with certain configurations of rails-html-sanitizer
## Summary

There is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer. This is due to an incomplete fix of CVE-2022-32209.

- Versions affected: ALL
- Not affected: NONE
- Fixed versions: 1.4.4


## Impact

A possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags to allow both "select" and "style" elements.

Code is only impacted if allowed tags are being overridden using either of the following two mechanisms:

1. Using the Rails configuration `config.action_view.sanitized_allow_tags=`:

  ```ruby
  # In config/application.rb
  config.action_view.sanitized_allowed_tags = ["select", "style"]
  ```

  (see https://guides.rubyonrails.org/configuring.html#configuring-action-view)

2. Using the class method `Rails::Html::SafeListSanitizer.allowed_tags=`:

  ```ruby
  # class-level option
  Rails::Html::SafeListSanitizer.allowed_tags = ["select", "style"]
  ```

All users overriding the allowed tags by either of the above mechanisms to include both "select" and "style" should either upgrade or use one of the workarounds immediately.

NOTE: Code is _not_ impacted if allowed tags are overridden using either of the following mechanisms:

- the `:tags` option to the Action View helper method `sanitize`.
- the `:tags` option to the instance method `SafeListSanitizer#sanitize`.


## Workarounds

Remove either "select" or "style" from the overridden allowed tags.


## References

- [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32209
- https://hackerone.com/reports/1654310


## Credit

This vulnerability was responsibly reported by Dominic Breuker.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23520.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23520.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23520
reference_id
reference_type
scores
0
value 0.00335
scoring_system epss
scoring_elements 0.56328
published_at 2026-04-13T12:55:00Z
1
value 0.00335
scoring_system epss
scoring_elements 0.56345
published_at 2026-04-12T12:55:00Z
2
value 0.00335
scoring_system epss
scoring_elements 0.5637
published_at 2026-04-11T12:55:00Z
3
value 0.00335
scoring_system epss
scoring_elements 0.56359
published_at 2026-04-16T12:55:00Z
4
value 0.00335
scoring_system epss
scoring_elements 0.56354
published_at 2026-04-08T12:55:00Z
5
value 0.00335
scoring_system epss
scoring_elements 0.56303
published_at 2026-04-07T12:55:00Z
6
value 0.00344
scoring_system epss
scoring_elements 0.57022
published_at 2026-04-04T12:55:00Z
7
value 0.00344
scoring_system epss
scoring_elements 0.56999
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23520
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23520
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
5
reference_url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-rrfc-7g8p-99q8
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-rrfc-7g8p-99q8
6
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23520.yml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23520.yml
7
reference_url https://hackerone.com/reports/1654310
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/1654310
8
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
9
reference_url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23520
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23520
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153
reference_id 1027153
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153751
reference_id 2153751
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153751
13
reference_url https://github.com/advisories/GHSA-rrfc-7g8p-99q8
reference_id GHSA-rrfc-7g8p-99q8
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rrfc-7g8p-99q8
14
reference_url https://access.redhat.com/errata/RHSA-2023:2097
reference_id RHSA-2023:2097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2097
fixed_packages
0
url pkg:gem/rails-html-sanitizer@1.4.4
purl pkg:gem/rails-html-sanitizer@1.4.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-apxn-up79-x3ge
1
vulnerability VCID-cphr-tdzs-x7ar
2
vulnerability VCID-rhb1-h2b8-jucb
3
vulnerability VCID-rz3c-6h7r-6bam
4
vulnerability VCID-ueen-aybd-tqh2
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/rails-html-sanitizer@1.4.4
aliases CVE-2022-23520, GHSA-rrfc-7g8p-99q8, GMS-2022-8301
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zcs7-hzze-u3a5
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:gem/rails-html-sanitizer@1.0.2