34 vulnerabilities classified as CWE-87 (替代XSS语法转义处理不恰当). AI Chinese analysis included.
CWE-87 represents an input validation weakness where software fails to properly sanitize user-controlled data against alternative script syntaxes, such as HTML entities, Unicode escapes, or embedded scripts within attributes. Attackers typically exploit this flaw by injecting malicious payloads that bypass standard filtering mechanisms, allowing them to execute arbitrary JavaScript in the victim’s browser context. This can lead to severe consequences, including session hijacking, credential theft, or defacement of the web application. To mitigate this risk, developers must implement robust output encoding strategies tailored to the specific context of the data insertion, such as HTML entity encoding for body content or attribute encoding for HTML attributes. Additionally, utilizing comprehensive, well-maintained security libraries and adhering to strict Content Security Policy headers can significantly reduce the attack surface, ensuring that alternate syntax variations are correctly neutralized before rendering.
public String preventXSS(String input, String mask) { return input.replaceAll("script", mask); }| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-39295 | Improper Neutralization of Alternate XSS Syntax in Knowage-Server — Knowage-Server | 6.1 | Medium | 2022-10-13 |
| CVE-2022-36033 | jsoup may not sanitize Cross-Site Scripting (XSS) attempts if SafeList.preserveRelativeLinks is enabled — jsoup | 6.1 | Medium | 2022-08-29 |
| CVE-2021-40131 | Cisco Common Services Platform Collector Stored Cross-Site Scripting Vulnerability — Cisco Common Services Platform Collector Software | 5.5 | Medium | 2021-11-18 |
| CVE-2020-5298 | Reflected XSS when importing CSV in OctoberCMS — october | 4.0 | Medium | 2020-06-03 |
Vulnerabilities classified as CWE-87 (替代XSS语法转义处理不恰当) represent 34 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.