Clean up user-submitted HTML, preserving allowlisted elements and allowlisted attributes on a per-element basis
80%
Total Score
57
95
100
100
50
| Title | Versions | Severity |
|---|---|---|
CVE-2026-44990 New sanitize-html is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in versions 0.0.0 - 2.17.3. | 0.0.0 - 2.17.3 | Critical |
CVE-2026-40186 sanitize-html is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in versions 2.17.2 - 2.17.3. | 2.17.2 - 2.17.3 | Medium |
CVE-2019-25225 sanitize-html is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in versions 0.0.0 - 2.0.0-beta. | 0.0.0 - 2.0.0-beta | Medium |
CVE-2024-21501 sanitize-html is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor in versions 0.0.0 - 2.12.1. | 0.0.0 - 2.12.1 | Medium |
CVE-2022-25887 sanitize-html is vulnerable to Inefficient Regular Expression Complexity in versions 0.0.0 - 2.7.1. | 0.0.0 - 2.7.1 | High |
| Dependency | Last Release | Score |
|---|---|---|
launder Version ^1.7.1 | — | — |
postcss Version ^8.3.11 | — | — |
deepmerge Version ^4.2.2 | — | — |
htmlparser2 Version ^10.1.0 | — | — |
parse-srcset Version ^1.0.2 | — | — |
Connect your repositories to instantly see whether vulnerable or malicious packages exist in your codebase.
Free. No credit card required.

SOC 2Compliant
ISO 27001Compliant