OWASP Java HTML Sanitizer is a configureable HTML Sanitizer written in Java, allowing inclusion of HTML authored by third-parties in web applications while protecting against XSS. In version 20240325.1, OWASP java html sanitizer is vulnerable to XSS if HtmlPolicyBuilder allows noscript and style tags with allowTextIn inside the style tag. This could lead to XSS if the payload is crafted in such a way that it does not sanitise the CSS and allows tags which is not mentioned in HTML policy. At time of publication no known patch is available.
References
| Link | Resource |
|---|---|
| https://github.com/OWASP/java-html-sanitizer/security/advisories/GHSA-g9gq-3pfx-2gw2 | Exploit Vendor Advisory |
| https://github.com/OWASP/java-html-sanitizer/security/advisories/GHSA-g9gq-3pfx-2gw2 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-11-26 02:15
Updated : 2025-12-30 16:34
NVD link : CVE-2025-66021
Mitre link : CVE-2025-66021
CVE.ORG link : CVE-2025-66021
JSON object : View
Products Affected
owasp
- java_html_sanitizer
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
