Skip to content

Commit 27b4f2f

Browse files
1 parent 2f48f50 commit 27b4f2f

6 files changed

Lines changed: 41 additions & 13 deletions

File tree

advisories/github-reviewed/2025/05/GHSA-3527-qv2q-pfvx/GHSA-3527-qv2q-pfvx.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3527-qv2q-pfvx",
4-
"modified": "2025-05-05T22:06:59Z",
4+
"modified": "2026-03-20T21:27:09Z",
55
"published": "2025-05-05T20:40:36Z",
66
"aliases": [
77
"CVE-2025-46734"
@@ -25,7 +25,7 @@
2525
"type": "ECOSYSTEM",
2626
"events": [
2727
{
28-
"introduced": "0"
28+
"introduced": "1.5.0"
2929
},
3030
{
3131
"fixed": "2.7.0"

advisories/github-reviewed/2026/03/GHSA-22cc-p3c6-wpvm/GHSA-22cc-p3c6-wpvm.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-22cc-p3c6-wpvm",
4-
"modified": "2026-03-18T16:17:43Z",
4+
"modified": "2026-03-20T21:27:39Z",
55
"published": "2026-03-18T16:17:43Z",
66
"aliases": [
77
"CVE-2026-33128"
@@ -62,6 +62,10 @@
6262
"type": "WEB",
6363
"url": "https://github.com/h3js/h3/security/advisories/GHSA-22cc-p3c6-wpvm"
6464
},
65+
{
66+
"type": "ADVISORY",
67+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33128"
68+
},
6569
{
6670
"type": "WEB",
6771
"url": "https://github.com/h3js/h3/commit/7791538e15ca22437307c06b78fa155bb73632a6"
@@ -82,6 +86,6 @@
8286
"severity": "HIGH",
8387
"github_reviewed": true,
8488
"github_reviewed_at": "2026-03-18T16:17:43Z",
85-
"nvd_published_at": null
89+
"nvd_published_at": "2026-03-20T10:16:19Z"
8690
}
8791
}

advisories/github-reviewed/2026/03/GHSA-26f5-8h2x-34xh/GHSA-26f5-8h2x-34xh.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-26f5-8h2x-34xh",
4-
"modified": "2026-03-18T16:17:58Z",
4+
"modified": "2026-03-20T21:27:48Z",
55
"published": "2026-03-18T16:17:58Z",
66
"aliases": [
77
"CVE-2026-33129"
@@ -43,9 +43,21 @@
4343
"type": "WEB",
4444
"url": "https://github.com/h3js/h3/security/advisories/GHSA-26f5-8h2x-34xh"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33129"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://github.com/h3js/h3/pull/1283"
53+
},
4654
{
4755
"type": "PACKAGE",
4856
"url": "https://github.com/h3js/h3"
57+
},
58+
{
59+
"type": "WEB",
60+
"url": "https://github.com/h3js/h3/releases/tag/v2.0.1-rc.9"
4961
}
5062
],
5163
"database_specific": {
@@ -55,6 +67,6 @@
5567
"severity": "MODERATE",
5668
"github_reviewed": true,
5769
"github_reviewed_at": "2026-03-18T16:17:58Z",
58-
"nvd_published_at": null
70+
"nvd_published_at": "2026-03-20T10:16:19Z"
5971
}
6072
}

advisories/github-reviewed/2026/03/GHSA-4v6x-c7xx-hw9f/GHSA-4v6x-c7xx-hw9f.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4v6x-c7xx-hw9f",
4-
"modified": "2026-03-09T15:50:47Z",
4+
"modified": "2026-03-20T21:26:30Z",
55
"published": "2026-03-06T23:27:03Z",
66
"aliases": [
77
"CVE-2026-30838"
88
],
99
"summary": "CommonMark has DisallowedRawHtml extension bypass via whitespace in HTML tag names",
10-
"details": "### Impact\n\nThe `DisallowedRawHtml` extension can be bypassed by inserting a newline, tab, or other ASCII whitespace character between a disallowed HTML tag name and the closing `>`. For example, `<script\\n>` would pass through unfiltered and be rendered as a valid HTML tag by browsers. This is a cross-site scripting (XSS) vector for any application that relies on this extension to sanitize untrusted user input.\n\nAll applications using the `DisallowedRawHtml` extension to process untrusted markdown are affected. Applications that use a dedicated HTML sanitizer (such as HTML Purifier) on the rendered output are not affected.\n\n### Patches\n\nFixed in 2.8.1. The regex character class `[ \\/>]` was changed to `[\\s\\/>]` to match all whitespace characters that browsers accept as valid tag name terminators.\n\n### Workarounds\n\n- Set the `html_input` configuration option to `'escape'` or `'strip'` to disable all raw HTML, though this is a broader restriction than the `DisallowedRawHtml` extension provides.\n- Pass the rendered HTML through a dedicated HTML sanitizer before serving it to users ([always recommended](https://commonmark.thephpleague.com/2.x/security/#additional-filtering))\n\n### Resources\n\n- [CommonMark DisallowedRawHtml documentation](https://commonmark.thephpleague.com/extensions/disallowed-raw-html/)\n- [CWE-79: Improper Neutralization of Input During Web Page Generation](https://cwe.mitre.org/data/definitions/79.html)\n- [CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)](https://cwe.mitre.org/data/definitions/80.html)",
10+
"details": "### Impact\n\nThe `DisallowedRawHtml` extension can be bypassed by inserting a newline, tab, or other ASCII whitespace character between a disallowed HTML tag name and the closing `>`. For example, `<script\\n>` would pass through unfiltered and be rendered as a valid HTML tag by browsers. This is a cross-site scripting (XSS) vector for any application that relies on this extension to sanitize untrusted user input.\n\nAll applications using the `DisallowedRawHtml` extension to process untrusted markdown are affected. Applications that use a dedicated HTML sanitizer (such as HTML Purifier) on the rendered output are not affected.\n\n### Patches\n\nFixed in 2.8.1. The regex character class `[ \\/>]` was changed to `[\\s\\/>]` to match all whitespace characters that browsers accept as valid tag name terminators.\n\n### Workarounds\n\n- Set the `html_input` configuration option to `'escape'` or `'strip'` to disable all raw HTML, though this is a broader restriction than the `DisallowedRawHtml` extension provides.\n- Pass the rendered HTML through a dedicated HTML sanitizer before serving it to users ([always recommended](https://commonmark.thephpleague.com/2.x/security/#additional-filtering))",
1111
"severity": [
1212
{
1313
"type": "CVSS_V4",
@@ -25,7 +25,7 @@
2525
"type": "ECOSYSTEM",
2626
"events": [
2727
{
28-
"introduced": "0"
28+
"introduced": "2.0.0"
2929
},
3030
{
3131
"fixed": "2.8.1"

advisories/github-reviewed/2026/03/GHSA-qpxp-75px-xjcp/GHSA-qpxp-75px-xjcp.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qpxp-75px-xjcp",
4-
"modified": "2026-03-18T16:17:31Z",
4+
"modified": "2026-03-20T21:27:30Z",
55
"published": "2026-03-18T16:17:31Z",
66
"aliases": [
77
"CVE-2026-33123"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/py-pdf/pypdf/security/advisories/GHSA-qpxp-75px-xjcp"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33123"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/py-pdf/pypdf/pull/3686"
@@ -61,6 +65,6 @@
6165
"severity": "MODERATE",
6266
"github_reviewed": true,
6367
"github_reviewed_at": "2026-03-18T16:17:31Z",
64-
"nvd_published_at": null
68+
"nvd_published_at": "2026-03-20T10:16:18Z"
6569
}
6670
}

advisories/github-reviewed/2026/03/GHSA-vg28-83rp-8xx4/GHSA-vg28-83rp-8xx4.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vg28-83rp-8xx4",
4-
"modified": "2026-03-18T14:25:15Z",
4+
"modified": "2026-03-20T21:27:20Z",
55
"published": "2026-03-18T14:25:15Z",
66
"aliases": [
77
"CVE-2026-33125"
@@ -40,9 +40,17 @@
4040
"type": "WEB",
4141
"url": "https://github.com/blakeblackshear/frigate/security/advisories/GHSA-vg28-83rp-8xx4"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33125"
46+
},
4347
{
4448
"type": "PACKAGE",
4549
"url": "https://github.com/blakeblackshear/frigate"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/blakeblackshear/frigate/releases/tag/v0.16.3"
4654
}
4755
],
4856
"database_specific": {
@@ -52,6 +60,6 @@
5260
"severity": "HIGH",
5361
"github_reviewed": true,
5462
"github_reviewed_at": "2026-03-18T14:25:15Z",
55-
"nvd_published_at": null
63+
"nvd_published_at": "2026-03-20T10:16:19Z"
5664
}
5765
}

0 commit comments

Comments
 (0)