jsondiffpatch is vulnerable to Cross-site Scripting (XSS) via HtmlFormatter::nodeBegin
        
  Moderate severity
        
          GitHub Reviewed
      
        Published
          Sep 11, 2025 
          to the GitHub Advisory Database
          •
          Updated Sep 22, 2025 
      
  
Description
        Published by the National Vulnerability Database
      Sep 11, 2025 
    
  
        Published to the GitHub Advisory Database
      Sep 11, 2025 
    
  
        Reviewed
      Sep 12, 2025 
    
  
        Last updated
      Sep 22, 2025 
    
  
Vulnerability in jsondiffpatch
Versions of
jsondiffpatchprior to0.7.2are vulnerable to Cross-site Scripting (XSS) in theHtmlFormatter(HtmlFormatter::nodeBegin). When diffs are rendered to HTML using the built-in formatter, untrusted payloads can inject scripts and execute in the context of a consuming web page.Affected versions: >= 0, < 0.7.2
Patched version: 0.7.2
Remediation
Upgrade to
jsondiffpatch0.7.2or later. The fix hardens the HTML formatter to avoid script injection.Workarounds
Avoid using the HTML formatter on untrusted diffs, or sanitize/escape the rendered output.
References