SVG sanitizer library before version 0.15.0
did not remove HTML elements wrapped in a CDATA section. As a result, SVG content embedded in HTML (fetched as text/html
) was susceptible to cross-site scripting. Plain SVG files (fetched as image/svg+xml
) were not affected.
This issue is fixed in 0.15.0
and higher.
There is currently no workaround available without upgrading.
If you have any questions or comments about this advisory:
github.com/advisories/GHSA-fqx8-v33p-4qcc
github.com/darylldoyle/svg-sanitizer
github.com/darylldoyle/svg-sanitizer/commit/17e12ba9c2881caa6b167d0fbea555c11207fbb0
github.com/darylldoyle/svg-sanitizer/issues/71
github.com/darylldoyle/svg-sanitizer/security/advisories/GHSA-fqx8-v33p-4qcc
github.com/FriendsOfPHP/security-advisories/blob/master/enshrined/svg-sanitize/CVE-2022-23638.yaml
nvd.nist.gov/vuln/detail/CVE-2022-23638