Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. phlex
  4. ›
  5. GHSA-w67g-2h6v-vjgq

GHSA-w67g-2h6v-vjgq: Phlex XSS protection bypass via attribute splatting, dynamic tags, and href values

February 6, 2026

During a security audit conducted with Claude Opus 4.6 and GPT-5.3-Codex, we identified three specific ways to bypass the XSS (cross-site-scripting) protection built into Phlex.

  1. The first bypass could happen if user-provided attributes with string keys were splatted into HTML tag, e.g. div(**user_attributes).
  2. The second bypass could happen if user-provided tag names were passed to the tag method, e.g. tag(some_tag_name_from_user).
  3. The third bypass could happen if user’s links were passed to href attributes, e.g. a(href: user_provided_link).

All three of these patterns are meant to be safe and all have now been patched.

References

  • github.com/advisories/GHSA-w67g-2h6v-vjgq
  • github.com/yippee-fun/phlex
  • github.com/yippee-fun/phlex/commit/1d85da417cb15eb8cb2f54a68d531c9b35d9d03a
  • github.com/yippee-fun/phlex/commit/556441d5a64ff93f749e8116a05b2d97264468ee
  • github.com/yippee-fun/phlex/commit/74e3d8610ffabc2cf5f241945e9df4b14dceb97d
  • github.com/yippee-fun/phlex/commit/9f56ad13bea9a7d6117fdfd510446c890709eeac
  • github.com/yippee-fun/phlex/commit/fe9ea708672f9fa42526d9b47e1cdc4634860ef1
  • github.com/yippee-fun/phlex/security/advisories/GHSA-w67g-2h6v-vjgq

Code Behaviors & Features

Detect and mitigate GHSA-w67g-2h6v-vjgq with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.4.0.beta1 before 2.4.1, all versions starting from 2.0.0.beta1 before 2.0.2, all versions before 1.11.1, all versions starting from 2.1.0 before 2.1.3, all versions starting from 2.2.0 before 2.2.2, all versions starting from 2.3.0 before 2.3.2

Fixed versions

  • 2.4.1
  • 2.3.2
  • 2.2.2
  • 2.1.3
  • 2.0.2
  • 1.11.1

Solution

Upgrade to versions 1.11.1, 2.0.2, 2.1.3, 2.2.2, 2.3.2, 2.4.1 or above.

Impact 7.1 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

gem/phlex/GHSA-w67g-2h6v-vjgq.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 07 Feb 2026 12:18:28 +0000.