WhisperX tag archive

#cross-site-scripting

This page collects WhisperX intelligence signals tagged #cross-site-scripting. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (4)

The Lab · 2026-04-29 07:54:12 · GitHub Issues

1. Angular Production Mode Vulnerability: Researchers Report Click-Triggered XSS via Attribute Bindings Bypasses Security Validation

Security researchers have identified a potential gap in Angular's production-mode security controls that may allow click-triggered cross-site scripting through specific attribute binding syntax. The vulnerability, reported through Angular's official GitHub issue tracker, centers on the interaction between `[attr.onclic...

The Lab · 2026-05-04 08:54:07 · GitHub Issues

2. XSS Vulnerability Identified in Webchat Adapter: Unsanitized HTML Rendering Allows Script Injection

A cross-site scripting vulnerability has been identified in the webchat channel implementation located at `channels/webchat`. The adapter renders agent responses using `innerHTML` or equivalent methods without applying sanitization, creating a direct pathway for malicious script injection when agent responses incorpora...

The Lab · 2026-05-11 08:10:38 · GitHub Issues

3. CodeQL Flags Unpatched XSS Vulnerability in homeschool-hero FileUpload Component

A high-severity cross-site scripting vulnerability has been identified in the frontend codebase of the homeschool-hero repository, according to an automated security scan. The finding, flagged by GitHub's CodeQL scanner on May 11, 2026, targets the FileUpload component located at `frontend/src/components/features/FileU...

The Lab · 2026-05-13 15:48:34 · GitHub Issues

4. Critical XSS Flaw in Dashboard Controller Exposes Users to Cookie-Based JavaScript Injection via Unescaped Font Parameter

A critical cross-site scripting vulnerability has been identified in the application's dashboard controller, stemming from unsanitized user input persisted through cookies. The flaw allowed attacker-controlled `params[:font]` values to be stored in `cookies[:font]` and subsequently injected—without escaping—into an inl...