### [CVE-2021-23472](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23472) ![](https://img.shields.io/static/v1?label=Product&message=bootstrap-table&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C1.19.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-site%20Scripting%20(XSS)&color=brightgreen) ### Description This affects versions before 1.19.1 of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set. ### POC #### Reference - https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1910690 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1910689 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910688 - https://snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597 #### Github - https://github.com/dellalibera/dellalibera