The Nextcloud dialogs library (npm package @nextcloud/dialogs) prior to 3.1.2 insufficiently escaped text input passed to a toast. If your application displays toasts with user-supplied input, this could lead to a XSS vulnerability. The vulnerability has been patched in version 3.1.2 If you need to display HTML in the toast, explicitly pass the `options.isHTML` config flag.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
nextcloud\\/dialogs project nextcloud\\/dialogs |