Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @paperclipai/ui
  4. ›
  5. GHSA-fpw4-p57j-hqmq

GHSA-fpw4-p57j-hqmq: Paperclip: Stored XSS via javascript: URLs in MarkdownBody — urlTransform override disables react-markdown sanitization

April 16, 2026

MarkdownBody, the shared component used to render every Markdown surface in the Paperclip UI (issue documents, issue comments, chat threads, approvals, agent details, export previews, etc.), passes urlTransform={(url) => url} to react-markdown. That override replaces react-markdown’s built-in defaultUrlTransform — the library’s only defense against javascript:/vbscript:/data: URL injection — with a no-op, and the custom a component then renders the unsanitized href directly. Any authenticated company member can plant [text](javascript:...) in an issue document or comment; when another member clicks the link, the script executes in the Paperclip origin with full access to the victim’s session, enabling cross-user account takeover inside a tenant.

References

  • github.com/advisories/GHSA-fpw4-p57j-hqmq
  • github.com/paperclipai/paperclip
  • github.com/paperclipai/paperclip/security/advisories/GHSA-fpw4-p57j-hqmq

Code Behaviors & Features

Detect and mitigate GHSA-fpw4-p57j-hqmq with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2026.416.0

Fixed versions

  • 2026.416.0

Solution

Upgrade to version 2026.416.0 or above.

Impact 5.4 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

npm/@paperclipai/ui/GHSA-fpw4-p57j-hqmq.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:36 +0000.