Skip to content

fix(security): sanitize bot_name and bot_description to prevent XSS#811

Open
JasonOA888 wants to merge 1 commit intoQwenLM:mainfrom
JasonOA888:fix/issue-810-xss-sanitization
Open

fix(security): sanitize bot_name and bot_description to prevent XSS#811
JasonOA888 wants to merge 1 commit intoQwenLM:mainfrom
JasonOA888:fix/issue-810-xss-sanitization

Conversation

@JasonOA888
Copy link
Copy Markdown

Fixes #810

Sanitize user inputs to prevent XSS attacks in WebUI.

  • Added html.escape() to bot_name and bot_description
  • Handles None values with default empty string
  • Prevents arbitrary JavaScript execution

- Added html.escape() to sanitize user inputs
- Prevents XSS attacks via malicious bot_name/description
- Handles None values with default empty string

Security: Fixes potential XSS vulnerability in WebUI where
user-controlled values were directly interpolated into HTML.

Fixes QwenLM#810
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[Security] Potential XSS via unsanitized bot_name and bot_description in WebUI

1 participant