Versions of the package jsondiffpatch before 0.7.2 are vulnerable to Cross-site Scripting (XSS) via HtmlFormatter::nodeBegin. An attacker can inject malicious scripts into HTML payloads that may lead to code execution if untrusted payloads were used as source for the diff, and the result renderer using the built-in html formatter on a private website.
https://security.snyk.io/vuln/SNYK-JS-JSONDIFFPATCH-10369031
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-12549276
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-12549277
https://github.com/benjamine/jsondiffpatch/issues/383
https://github.com/benjamine/jsondiffpatch/commit/0e374b5dd8d7879b329a9fc18affbd46ad50dd14
Published: 2025-09-11
Updated: 2025-09-11
Base Score: 4
Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N
Severity: Medium
Base Score: 4.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
Severity: Medium
Base Score: 2.3
Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
Severity: Low
EPSS: 0.00034