golang.org/x/net vulnerable to Cross-site Scripting
Moderate severity
GitHub Reviewed
Published
Apr 16, 2025
to the GitHub Advisory Database
•
Updated May 17, 2025
Description
Published by the National Vulnerability Database
Apr 16, 2025
Published to the GitHub Advisory Database
Apr 16, 2025
Reviewed
Apr 16, 2025
Last updated
May 17, 2025
The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).
References