Promptcraft Forge Studio is a toolkit for evaluating, optimizing, and maintaining LLM-powered applications. All versions of Promptcraft Forge Studio sanitize user input using regex blacklists such as r`eplace(/javascript:/gi, '')`. Because the package uses multi-character tokens and each replacement is applied only once, removing one occurrence can create a new dangerous token due to overlap. The “sanitized” value may still contain an executable payload when used in href/src (or injected into the DOM). There is currently no fix for this issue.
Metrics
Affected Vendors & Products
References
History
Fri, 05 Sep 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Promptcraft-forge-studio Project
Promptcraft-forge-studio Project promptcraft-forge-studio |
|
Vendors & Products |
Promptcraft-forge-studio Project
Promptcraft-forge-studio Project promptcraft-forge-studio |
Thu, 04 Sep 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 04 Sep 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Promptcraft Forge Studio is a toolkit for evaluating, optimizing, and maintaining LLM-powered applications. All versions of Promptcraft Forge Studio sanitize user input using regex blacklists such as r`eplace(/javascript:/gi, '')`. Because the package uses multi-character tokens and each replacement is applied only once, removing one occurrence can create a new dangerous token due to overlap. The “sanitized” value may still contain an executable payload when used in href/src (or injected into the DOM). There is currently no fix for this issue. | |
Title | Promptcraft Forge Studio: Complete Sanitizer Bypass Enables XSS via Overlapping Patterns | |
Weaknesses | CWE-184 CWE-20 CWE-79 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-09-04T19:39:23.567Z
Updated: 2025-09-04T20:13:09.147Z
Reserved: 2025-08-29T16:19:59.010Z
Link: CVE-2025-58353

Updated: 2025-09-04T20:13:03.273Z

Status : Awaiting Analysis
Published: 2025-09-04T20:15:39.420
Modified: 2025-09-05T17:47:10.303
Link: CVE-2025-58353

No data.