Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could exploit this vulnerability to gather details about the file system structure and dependencies of the targeted server.
gist.github.com/Slonser/8b4d061abe6ee1b2e10c7242987674cf
github.com/apostrophecms/apostrophe/discussions/4436
github.com/apostrophecms/sanitize-html/commit/c5dbdf77fe8b836d3bf4554ea39edb45281ec0b4
github.com/apostrophecms/sanitize-html/pull/650
security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6276557
security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-6256334