@babylonjs/gui is vulnerable to Cross-site Scripting (XSS)
40
Medium Risk
Affected versions of this package are vulnerable to SVG parsing XSS, where image loader insecurely processes SVG content, failing to sanitize non-SVG elements like <link> or <img> during parsing. It allows attackers to craft malicious SVG images containing embedded scripts or external resource tags that execute when loaded via Babylon.js GUI.Image component. Exploitation occurs when a vulnerable application (without proper Content Security Policies) renders user-supplied SVG files, enabling cross-site scripting (XSS) attacks that hijack user sessions, steal data, or perform malicious actions within the application context.
You are affected if you are using a version that falls within the vulnerable range.
@babylonjs/gui is vulnerable to Cross-site Scripting (XSS) in versions 4.1.0 - 8.17.1.
Upgrade the @babylonjs/gui library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant