Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. django-tomselect
  4. ›
  5. GHSA-785h-76cm-cpmf

GHSA-785h-76cm-cpmf: Django TomSelect incomplete escaping of dangerous characters in widget attributes

March 26, 2025 (updated October 31, 2025)

User supplied values passed through to certain attributes in form widgets are not fully escaped for potentially dangerous tokens, and in some cases are rendered in browser as valid html tags.

References

  • github.com/OmenApps/django-tomselect
  • github.com/OmenApps/django-tomselect/commit/0990ed36c8874f9d42fa9deff7734bf8dcd46d40
  • github.com/OmenApps/django-tomselect/security/advisories/GHSA-785h-76cm-cpmf
  • github.com/advisories/GHSA-785h-76cm-cpmf

Code Behaviors & Features

Detect and mitigate GHSA-785h-76cm-cpmf with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2025.3.3

Fixed versions

  • 2025.3.3

Solution

Upgrade to version 2025.3.3 or above.

Impact 3.7 LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-116: Improper Encoding or Escaping of Output
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

pypi/django-tomselect/GHSA-785h-76cm-cpmf.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 10 Dec 2025 00:19:27 +0000.