Skip to content

security: Prevent Stored XSS in Ticket Submissions#8335

Open
serfersac wants to merge 1 commit intofaveosuite:developmentfrom
serfersac:security/xss-prevention
Open

security: Prevent Stored XSS in Ticket Submissions#8335
serfersac wants to merge 1 commit intofaveosuite:developmentfrom
serfersac:security/xss-prevention

Conversation

@serfersac
Copy link
Copy Markdown

This PR addresses a critical Stored XSS vulnerability vector within ticket and reply creation.

Changes:

  • Implemented robust HTML sanitization on ticket bodies prior to database insertion.
  • Neutralized malicious payloads (e.g., <script>, onerror handlers) while preserving safe rich-text formatting.
  • Adhered to PSR-12 styling guidelines.

@pull-request-size pull-request-size Bot added the size/S Issue will take 1 day to complete label Apr 29, 2026
@serfersac serfersac force-pushed the security/xss-prevention branch 2 times, most recently from 27dd87a to 99a86ac Compare April 29, 2026 10:05
@serfersac serfersac force-pushed the security/xss-prevention branch from 99a86ac to 61a9819 Compare April 29, 2026 10:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

size/S Issue will take 1 day to complete

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant