If a trusted template author were to write a <script> tag containing an empty 'type' attribute or a 'type' attribute with an ASCII whitespace, the execution of the template would incorrectly escape any data passed into the <script> block.
Metrics
Affected Vendors & Products
References
History
Thu, 07 May 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 |
Thu, 07 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Go Standard Library
Go Standard Library html/template |
|
| Vendors & Products |
Go Standard Library
Go Standard Library html/template |
Thu, 07 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | If a trusted template author were to write a <script> tag containing an empty 'type' attribute or a 'type' attribute with an ASCII whitespace, the execution of the template would incorrectly escape any data passed into the <script> block. | |
| Title | Escaper bypass leads to XSS in html/template | |
| References |
|
Status: PUBLISHED
Assigner: Go
Published: 2026-05-07T19:41:19.138Z
Updated: 2026-05-07T19:41:19.138Z
Reserved: 2026-04-07T18:13:03.528Z
Link: CVE-2026-39826
No data.
Status : Awaiting Analysis
Published: 2026-05-07T20:16:43.490
Modified: 2026-05-07T20:38:04.860
Link: CVE-2026-39826
No data.
ReportizFlow