jannik4 / wesldoc

/ crates / wesldoc

This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate wesldoc

Dependencies

(5 total, 2 outdated)

CrateRequiredLatestStatus
 env_logger^0.11.80.11.10up to date
 clap^4.5.364.6.1up to date
 cargo_metadata^0.22.00.23.1out of date
 toml^0.9.71.1.2+spec-1.1.0out of date
 serde^1.0.2261.0.228up to date

Crate wesldoc_ast

Dependencies

(3 total, all up-to-date)

CrateRequiredLatestStatus
 semver^1.0.201.0.28up to date
 indexmap^2.1.02.14.0up to date
 pulldown-cmark^0.13.00.13.3up to date

Crate wesldoc_compiler

Dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 log^0.4.270.4.29up to date

Crate wesldoc_generator

Dependencies

(5 total, 1 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 askama^0.13.00.15.6out of date
 include_dir^0.7.40.7.4up to date
 serde^1.0.1931.0.228up to date
 serde_json^1.0.1081.0.149up to date
 ammonia ⚠️^4.0.04.1.2maybe insecure

Security Vulnerabilities

ammonia: Incorrect handling of embedded SVG and MathML leads to mutation XSS after removal

RUSTSEC-2025-0071

Affected versions of this crate did not correctly strip namespace-incompatible tags in certain situations, causing it to incorrectly account for differences between HTML, SVG, and MathML.

This vulnerability only has an effect when the svg or math tag is allowed, because it relies on a tag being parsed as html during the cleaning process, but serialized in a way that causes in to be parsed as xml by the browser.

Additionally, the application using this library must allow a tag that is parsed as raw text in HTML. These elements are:

  • title
  • textarea
  • xmp
  • iframe
  • noembed
  • noframes
  • plaintext
  • noscript
  • style
  • script

Applications that do not explicitly allow any of these tags should not be affected, since none are allowed by default.