jsondiffpatch is vulnerable to Cross-site Scripting (XSS) via HtmlFormatter::nodeBegin
Moderate severity
GitHub Reviewed
Published
Sep 11, 2025
to the GitHub Advisory Database
•
Updated Sep 22, 2025
Description
Published by the National Vulnerability Database
Sep 11, 2025
Published to the GitHub Advisory Database
Sep 11, 2025
Reviewed
Sep 12, 2025
Last updated
Sep 22, 2025
Vulnerability in jsondiffpatch
Versions of
jsondiffpatch
prior to0.7.2
are vulnerable to Cross-site Scripting (XSS) in theHtmlFormatter
(HtmlFormatter::nodeBegin
). When diffs are rendered to HTML using the built-in formatter, untrusted payloads can inject scripts and execute in the context of a consuming web page.Affected versions: >= 0, < 0.7.2
Patched version: 0.7.2
Remediation
Upgrade to
jsondiffpatch
0.7.2
or later. The fix hardens the HTML formatter to avoid script injection.Workarounds
Avoid using the HTML formatter on untrusted diffs, or sanitize/escape the rendered output.
References