repostat: Reflected Cross-Site Scripting (XSS) via repo prop in RepoCard
Moderate severity
GitHub Reviewed
Published
Feb 21, 2026
in
denpiligrim/repostat
•
Updated Feb 25, 2026
Description
Published by the National Vulnerability Database
Feb 25, 2026
Published to the GitHub Advisory Database
Feb 25, 2026
Reviewed
Feb 25, 2026
Last updated
Feb 25, 2026
Impact
The
RepoCardcomponent is vulnerable to Reflected Cross-Site Scripting (XSS). The vulnerability occurs because the component uses React'sdangerouslySetInnerHTMLto render the repository name (repoprop) during the loading state without any sanitization.If a developer using this package passes unvalidated user input directly into the
repoprop (for example, reading it from a URL query parameter), an attacker can execute arbitrary JavaScript in the context of the user's browser.Proof of Concept
Remediation
Update to version 1.0.1. The use of dangerouslySetInnerHTML has been removed, and the repo prop is now safely rendered using standard React JSX data binding, which automatically escapes HTML entities.
References