Parsing arbitrary HTML which is then rendered using Render can result in an unexpected HTML tree. This can be leveraged to execute XSS attacks in applications that attempt to sanitize input HTML before rendering.
Metrics
Affected Vendors & Products
References
History
Fri, 22 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 |
Fri, 22 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 22 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 |
Fri, 22 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Parsing arbitrary HTML which is then rendered using Render can result in an unexpected HTML tree. This can be leveraged to execute XSS attacks in applications that attempt to sanitize input HTML before rendering. | |
| Title | Invoking incorrect handling of character references in DOCTYPE nodes in golang.org/x/net/html | |
| References |
|
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2026-05-22T17:46:20.366Z
Reserved: 2026-02-05T01:35:43.738Z
Link: CVE-2026-25681
Updated: 2026-05-22T17:46:16.872Z
No data.
No data.
OpenCVE Enrichment
Updated: 2026-05-22T21:30:16Z