{"id":"CVE-2019-10772","details":"It is possible to bypass enshrined/svg-sanitize before 0.13.1 using the \"xlink:href\" attribute due to mishandling of the xlink namespace by the sanitizer.","aliases":["GHSA-8rc5-hx3v-2jg7"],"modified":"2026-04-11T18:24:43.790501Z","published":"2019-12-11T16:15:10.777Z","related":["SNYK-PHP-ENSHRINEDSVGSANITIZE-536969"],"references":[{"type":"EVIDENCE","url":"https://snyk.io/vuln/SNYK-PHP-ENSHRINEDSVGSANITIZE-536969"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/darylldoyle/svg-sanitizer","events":[{"introduced":"0"},{"fixed":"6add43e5c5649bc40e3afcb68c522720dcb336f9"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"0.13.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:svg-sanitizer_project:svg-sanitizer:*:*:*:*:*:*:*:*"}}],"versions":["0.1.0","0.1.1","0.1.2","0.1.3","0.1.4","0.1.5","0.1.6","0.10.0","0.12.0","0.13.0","0.2.0","0.2.1","0.3.0","0.4.0","0.4.1","0.5.0","0.5.1","0.5.2","0.5.3","0.5.3.1","0.6.0","0.7.0","0.7.1","0.7.2","0.8.0","0.8.1","0.8.2","0.9.0","0.9.1","0.9.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-10772.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}