{"id":"CVE-2021-23472","details":"This affects versions before 1.19.1 of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set.","aliases":["GHSA-mw6q-98mp-g8g8"],"modified":"2026-04-02T06:48:21.387081Z","published":"2021-11-03T18:15:08.010Z","related":["SNYK-JAVA-ORGWEBJARS-1910690","SNYK-JAVA-ORGWEBJARSBOWER-1910689","SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687","SNYK-JAVA-ORGWEBJARSNPM-1910688","SNYK-JS-BOOTSTRAPTABLE-1657597"],"references":[{"type":"ADVISORY","url":"https://github.com/wenzhixin/bootstrap-table/blob/develop/src/utils/index.js%23L218"},{"type":"FIX","url":"https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597"},{"type":"EVIDENCE","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1910689"},{"type":"EVIDENCE","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687"},{"type":"EVIDENCE","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910688"},{"type":"EVIDENCE","url":"https://snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597"},{"type":"EVIDENCE","url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1910690"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wenzhixin/bootstrap-table","events":[{"introduced":"0"},{"fixed":"d73547cbb2d79cba0288b17a6ed44ff92753dd8e"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.19.1"}]}}],"versions":["1.0.1","1.0.2","1.0.3","1.0.4","1.0.5","1.0.6","1.1.0","1.1.1","1.1.2","1.1.3","1.1.4","1.1.5","1.10.0","1.10.1","1.11.0","1.11.1","1.12.0","1.12.1","1.12.2","1.13.0","1.13.1","1.13.2","1.13.3","1.13.4","1.13.5","1.14.1","1.14.2","1.15.2","1.15.3","1.15.4","1.15.5","1.16.0","1.17.0","1.17.1","1.18.0","1.18.1","1.18.2","1.18.3","1.19.0","1.2.0","1.2.1","1.2.2","1.2.3","1.2.4","1.3.0","1.4.0","1.5.0","1.6.0","1.7.0","1.8.0","1.8.1","1.9.0","1.9.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-23472.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}