jannik4 / wesldoc

/ crates / wesldoc

This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate wesldoc

Dependencies

(5 total, 1 outdated)

CrateRequiredLatestStatus
 env_logger^0.11.80.11.8up to date
 clap^4.5.364.5.53up to date
 cargo_metadata^0.22.00.23.1out of date
 toml^0.9.70.9.8up to date
 serde^1.0.2261.0.228up to date

Crate wesldoc_ast

Dependencies

(3 total, all up-to-date)

CrateRequiredLatestStatus
 semver^1.0.201.0.27up to date
 indexmap^2.1.02.12.1up to date
 pulldown-cmark^0.13.00.13.0up to date

Crate wesldoc_compiler

Dependencies

(1 total, all up-to-date)

CrateRequiredLatestStatus
 log^0.4.270.4.28up to date

Crate wesldoc_generator

Dependencies

(5 total, 1 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 askama^0.13.00.14.0out of date
 include_dir^0.7.40.7.4up to date
 serde^1.0.1931.0.228up to date
 serde_json^1.0.1081.0.145up to date
 ammonia ⚠️^4.0.04.1.2maybe insecure

Security Vulnerabilities

ammonia: Incorrect handling of embedded SVG and MathML leads to mutation XSS after removal

RUSTSEC-2025-0071

Affected versions of this crate did not correctly strip namespace-incompatible tags in certain situations, causing it to incorrectly account for differences between HTML, SVG, and MathML.

This vulnerability only has an effect when the svg or math tag is allowed, because it relies on a tag being parsed as html during the cleaning process, but serialized in a way that causes in to be parsed as xml by the browser.

Additionally, the application using this library must allow a tag that is parsed as raw text in HTML. These elements are:

  • title
  • textarea
  • xmp
  • iframe
  • noembed
  • noframes
  • plaintext
  • noscript
  • style
  • script

Applications that do not explicitly allow any of these tags should not be affected, since none are allowed by default.