Skip to content

chore(deps): bump rhukster/dom-sanitizer from 1.0.7 to 1.0.10#2

Open
dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot/composer/rhukster/dom-sanitizer-1.0.10
Open

chore(deps): bump rhukster/dom-sanitizer from 1.0.7 to 1.0.10#2
dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot/composer/rhukster/dom-sanitizer-1.0.10

Conversation

@dependabot
Copy link
Copy Markdown

@dependabot dependabot bot commented on behalf of github Apr 10, 2026

Bumps rhukster/dom-sanitizer from 1.0.7 to 1.0.10.

Release notes

Sourced from rhukster/dom-sanitizer's releases.

1.0.10

Security

  • Fixed CSS injection via SVG/HTML <style> text content (GHSA-93vf-569f-22cq) — DOMSanitizer::sanitize() allowed <style> elements in both SVG and HTML mode but never inspected their text content, letting CSS url() references and @import rules pass through unfiltered. An attacker could exfiltrate the page URL to an external host, load arbitrary stylesheets, or use CSS attribute-selector tricks to leak form token values. The fix walks <style> text nodes and drops the element if it contains @import, url(...) with an external scheme (http:, https:, ftp:, //, data:), or legacy expression(). CSS hex escapes like \75 rl(...) are decoded before matching so escape-based bypasses are caught. Fragment references such as url(#gradientId) are preserved so SVG <defs>, gradients, filters, and masks continue to work normally.

1.0.9

Security & Bug Fixes

Security

  • Fixed SVG sanitizer bypass via ASCII whitespace entities (rhukster/dom-sanitizer#6) — Addresses a bypass of the CVE-2026-33172 fix where character entities like (tab), (newline), and (CR) could be used to smuggle javascript: URIs past the regex-based sanitization. The fix adds DOM-level URL scheme validation that operates on decoded attribute values, eliminating this entire class of entity-encoding bypasses.
  • Added comprehensive XSS event handler tests for GHSA-gxwg-x2jg-q44j to improve test coverage of onload, onclick, onerror, onmouseover, and other event handler stripping across SVG and HTML contexts.
  • Added SECURITY.md with instructions for private vulnerability reporting.

Bug Fixes

  • Fixed SVG filter elements being incorrectly removed (rhukster/dom-sanitizer#5) — SVG filter tags (feGaussianBlur, feBlend, feColorMatrix, etc.) were defined in camelCase but compared against lowercased tag names, causing all filter elements to be silently stripped during sanitization.

1.0.8

No release notes provided.

Commits
  • 49a9804 fix for CSS injection via SVG/HTML <style> text content (GHSA-93vf-569f-22cq)
  • 17a1692 add security policy
  • 9480b31 fix for compressed svg test
  • e2e59df Default SVG filters shouldn't be camel case - fixes #5
  • 2bca068 fix for SVG Sanitizer Bypass via ASCII Whitespace Entities in javascript: URI...
  • 0794d8d Add comprehensive XSS event handler tests (GHSA-gxwg-x2jg-q44j)
  • 757e4d6 Merge pull request #1 from DeepDiver1975/fix/removeattributens
  • c1b956c fix: disallow xlink:href
  • See full diff in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [rhukster/dom-sanitizer](https://github.com/rhukster/dom-sanitizer) from 1.0.7 to 1.0.10.
- [Release notes](https://github.com/rhukster/dom-sanitizer/releases)
- [Commits](rhukster/dom-sanitizer@1.0.7...1.0.10)

---
updated-dependencies:
- dependency-name: rhukster/dom-sanitizer
  dependency-version: 1.0.10
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file php Pull requests that update php code labels Apr 10, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file php Pull requests that update php code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants