Bump sanitize-html from 2.17.3 to 2.17.4#83
Merged
github-actions[bot] merged 1 commit intoMay 13, 2026
Conversation
Bumps [sanitize-html](https://github.com/apostrophecms/apostrophe/tree/HEAD/packages/sanitize-html) from 2.17.3 to 2.17.4. - [Changelog](https://github.com/apostrophecms/apostrophe/blob/main/packages/sanitize-html/CHANGELOG.md) - [Commits](https://github.com/apostrophecms/apostrophe/commits/HEAD/packages/sanitize-html) --- updated-dependencies: - dependency-name: sanitize-html dependency-version: 2.17.4 dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com>
Contributor
|
🤖 Hi @dependabot[bot], I've received your request, and I'm working on it now! You can track my progress in the logs for more details. |
Contributor
|
🤖 I'm sorry @dependabot[bot], but I was unable to process your request. Please see the logs for more details. |
Contributor
There was a problem hiding this comment.
No issues found across 3 files
Confidence score: 5/5
- Automated review surfaced no issues in the provided summaries.
- No files require special attention.
Architecture diagram
sequenceDiagram
participant Client as Web Client
participant App as Application Server
participant Sanitizer as sanitize-html 2.17.4
participant Launder as launder (shared)
Note over Client,Launder: HTML Sanitization Flow (Security Critical)
Client->>App: Submit user-generated HTML content
App->>Sanitizer: sanitize(html, options)
Note over Sanitizer: NEW: xmp tag properly handled<br>as forbidden content wrapper
Sanitizer->>Launder: CHANGED: naughtyHref() shared implementation
alt Unchanged path - allowed tags
Launder-->>Sanitizer: clean href values
Sanitizer->>Sanitizer: Parse allowed tags and attributes
Sanitizer-->>App: Sanitized HTML (safe)
else CHANGED path - xmp tag present
Launder-->>Sanitizer: clean href values
Sanitizer->>Sanitizer: NEW: Correctly process xmp as forbidden<br>instead of allowing embedded tags
Sanitizer-->>App: Sanitized HTML (xmp content stripped)
end
alt Malicious content detected
Sanitizer->>Sanitizer: Strip forbidden tags (including xmp)
Sanitizer-->>App: Clean HTML output
end
App-->>Client: Return sanitized content
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Bumps sanitize-html from 2.17.3 to 2.17.4.
Changelog
Sourced from sanitize-html's changelog.
Commits
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)Summary by cubic
Upgrade
sanitize-htmlto 2.17.4 to fix a security issue where thexmptag could bypass sanitization. This mitigates XSS risk with no application code changes.sanitize-htmlfrom 2.17.3 to 2.17.4.launder@^1.7.1anddayjs@^1.11.7.package-lock.jsonandyarn.lock.Written for commit 3a0353c. Summary will update on new commits.