The package svelte before 3.49.0 are vulnerable to Cross-site Scripting (XSS) due to improper input sanitization and to improper escape of attributes when using objects during SSR (Server-Side Rendering). Exploiting this vulnerability is possible via objects with a custom toString() function.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://snyk.io/vuln/SNYK-JS-SVELTE-2931080 | patch third party advisory exploit |
https://github.com/sveltejs/svelte/pull/7530%23issuecomment-1158575990 | broken link |
https://github.com/sveltejs/svelte/commit/f8605d6acbf66976da9b4547f76e90e163899907 | patch third party advisory exploit |