Headline
GHSA-vfpf-xmwh-8m65: ProsemirrorToHtml has a Cross-Site Scripting (XSS) vulnerability through unescaped HTML attribute values
Impact
The prosemirror_to_html gem is vulnerable to Cross-Site Scripting (XSS) attacks through malicious HTML attribute values. While tag content is properly escaped, attribute values are not, allowing attackers to inject arbitrary JavaScript code.
Who is impacted:
- Any application using prosemirror_to_html to convert ProseMirror documents to HTML
- Applications that process user-generated ProseMirror content are at highest risk
- End users viewing the rendered HTML output could have malicious JavaScript executed in their browsers
Attack vectors include:
hrefattributes withjavascript:protocol:<a href="javascript:alert(document.cookie)">- Event handlers:
<div onclick="maliciousCode()"> onerrorattributes on images:<img src=x onerror="alert('XSS')">- Other HTML attributes that can execute JavaScript
Patches
A fix is currently in development. Users should upgrade to version 0.2.1 or later once released.
The patch escapes all HTML attribute values using CGI.escapeHTML
to prevent injection attacks.
Workarounds
Until a patched version is available, users can implement one or more of these mitigations:
html = ProsemirrorToHtml.render(document)
safe_html = Sanitize.fragment(html, Sanitize::Config::RELAXED)
- Implement Content Security Policy (CSP): Add strict CSP headers to prevent inline JavaScript execution:
Content-Security-Policy: default-src 'self'; script-src 'self'
- Input validation: If possible, validate and sanitize ProseMirror documents before conversion to prevent malicious content from entering the system.
References
- Vulnerable code: https://github.com/etaminstudio/prosemirror_to_html/blob/ea8beb32f6c37f29f042ba4155ccf18504da716e/lib/prosemirror_to_html.rb#L249
- OWASP XSS Prevention Cheat Sheet
Skip to content
Navigation Menu
AI CODE CREATION
GitHub CopilotWrite better code with AI
GitHub SparkBuild and deploy intelligent apps
GitHub ModelsManage and compare prompts
MCP RegistryNewDiscover and integrate external tools
View all features
- Pricing
Provide feedback
Saved searches****Use saved searches to filter your results more quickly
Sign up
Appearance settings
- GitHub Advisory Database
- GitHub Reviewed
- GHSA-vfpf-xmwh-8m65
ProsemirrorToHtml has a Cross-Site Scripting (XSS) vulnerability through unescaped HTML attribute values
High severity GitHub Reviewed Published Nov 7, 2025 to the GitHub Advisory Database • Updated Nov 7, 2025
Package
bundler prosemirror_to_html (RubyGems)
Affected versions
< 0.2.1
Description
Published to the GitHub Advisory Database
Nov 7, 2025
EPSS score