Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://go.dev/issue/61615 | patch vendor advisory issue tracking |
https://go.dev/cl/514896 | patch |
https://pkg.go.dev/vuln/GO-2023-1988 | patch vendor advisory issue tracking |