-
Notifications
You must be signed in to change notification settings - Fork 1.4k
Description
CVE-2025-66021 - High Severity Vulnerability
Vulnerable Library - owasp-java-html-sanitizer-20240325.1.jar
Takes third-party HTML and produces HTML that is safe to embed in your web application. Fast and easy to configure.
Library home page: https://github.com/OWASP/java-html-sanitizer
Path to dependency file: /hapi-fhir-storage-batch2/pom.xml
Path to vulnerable library: /hapi-fhir-storage-batch2/pom.xml,/hapi-fhir-cli/hapi-fhir-cli-app/pom.xml,/hapi-fhir-server/pom.xml,/hapi-fhir-structures-dstu3/pom.xml,/hapi-tinder-plugin/pom.xml,/hapi-fhir-test-utilities/pom.xml,/hapi-fhir-jpaserver-searchparam/pom.xml,/hapi-fhir-jpaserver-elastic-test-utilities/pom.xml,/hapi-fhir-storage-batch2-test-utilities/pom.xml,/hapi-fhir-cli/hapi-fhir-cli-api/pom.xml,/hapi-fhir-jpaserver-model/pom.xml,/tests/hapi-fhir-base-test-jaxrsserver-kotlin/pom.xml,/hapi-fhir-jpaserver-base/pom.xml,/tests/hapi-fhir-base-test-mindeps-server/pom.xml,/hapi-fhir-spring-boot/hapi-fhir-spring-boot-autoconfigure/pom.xml,/hapi-fhir-server-openapi/pom.xml,/hapi-fhir-server-mdm/pom.xml,/hapi-fhir-spring-boot/hapi-fhir-spring-boot-samples/hapi-fhir-spring-boot-sample-server-jersey/pom.xml,/hapi-fhir-jpaserver-subscription/pom.xml,/hapi-fhir-converter/pom.xml,/hapi-fhir-storage-mdm/pom.xml,/hapi-fhir-storage-batch2-jobs/pom.xml,/hapi-fhir-jpaserver-ips/pom.xml,/hapi-fhir-structures-dstu2.1/pom.xml,/hapi-fhir-structures-hl7org-dstu2/pom.xml,/hapi-fhir-structures-dstu2/pom.xml,/hapi-tinder-test/pom.xml,/hapi-fhir-storage-test-utilities/pom.xml,/hapi-fhir-jpaserver-mdm/pom.xml,/hapi-fhir-testpage-overlay/pom.xml,/hapi-fhir-jpaserver-test-utilities/pom.xml,/hapi-fhir-structures-r4/pom.xml,/hapi-fhir-jpaserver-hfql/pom.xml,/hapi-fhir-structures-r5/pom.xml,/hapi-fhir-server-cds-hooks/pom.xml,/hapi-fhir-jpaserver-uhnfhirtest/pom.xml,/hapi-fhir-jaxrsserver-base/pom.xml,/hapi-fhir-docs/pom.xml,/hapi-fhir-structures-r4b/pom.xml,/hapi-fhir-jpaserver-hfql/pom.xml
Dependency Hierarchy:
- ❌ owasp-java-html-sanitizer-20240325.1.jar (Vulnerable Library)
Found in base branch: master
Vulnerability Details
OWASP Java HTML Sanitizer is a configureable HTML Sanitizer written in Java, allowing inclusion of HTML authored by third-parties in web applications while protecting against XSS. In version 20240325.1, OWASP java html sanitizer is vulnerable to XSS if HtmlPolicyBuilder allows noscript and style tags with allowTextIn inside the style tag. This could lead to XSS if the payload is crafted in such a way that it does not sanitise the CSS and allows tags which is not mentioned in HTML policy. At time of publication no known patch is available.
Publish Date: 2025-11-26
URL: CVE-2025-66021
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: None
Step up your Open Source Security Game with Mend here