goldmark vulnerable to Cross-site Scripting (XSS)
Moderate severity
GitHub Reviewed
Published
Apr 17, 2026
to the GitHub Advisory Database
•
Updated Apr 18, 2026
Package
Affected versions
< 1.7.17
Patched versions
1.7.17
Description
Published by the National Vulnerability Database
Apr 15, 2026
Published to the GitHub Advisory Database
Apr 17, 2026
Reviewed
Apr 18, 2026
Last updated
Apr 18, 2026
Versions of the package github.com/yuin/goldmark/renderer/html before 1.7.17 are vulnerable to Cross-site Scripting (XSS) due to improper ordering of URL validation and normalization. The renderer validates link destinations using a prefix-based check (IsDangerousURL) before resolving HTML entities. This allows an attacker to bypass protocol filtering by encoding dangerous schemes using HTML5 named character references. For example, a payload such as javascript:alert(1) is not recognized as dangerous during validation, leading to arbitrary script execution in the context of applications that render the URL.
References