Update dependency league/commonmark to ^2.8.2 [SECURITY]#354
Open
renovate[bot] wants to merge 1 commit intostagingfrom
Open
Update dependency league/commonmark to ^2.8.2 [SECURITY]#354renovate[bot] wants to merge 1 commit intostagingfrom
renovate[bot] wants to merge 1 commit intostagingfrom
Conversation
fbb7b86 to
a498aa6
Compare
a498aa6 to
a8d9f71
Compare
| datasource | package | from | to | | ---------- | ----------------- | ----- | ----- | | packagist | league/commonmark | 2.7.1 | 2.8.2 | Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
a8d9f71 to
15451be
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
^2.7.1→^2.8.2GitHub Vulnerability Alerts
CVE-2026-33347
Impact
The
DomainFilteringAdapterin the Embed extension is vulnerable to an allowlist bypass due to a missing hostname boundary assertion in the domain-matching regex. An attacker-controlled domain likeyoutube.com.evilpasses the allowlist check whenyoutube.comis an allowed domain.This enables two attack vectors:
OscaroteroEmbedAdaptermakes server-side HTTP requests to the embed URL via theembed/embedlibrary. A bypassed domain filter causes the server to make outbound requests to an attacker-controlled host, potentially probing internal services or exfiltrating request metadata.EmbedRendereroutputs the oEmbed response HTML directly into the page with no sanitization. An attacker controlling the bypassed domain can return arbitrary HTML/JavaScript in their oEmbed response, which is rendered verbatim.Any application using the
Embedextension and relying onallowed_domainsto restrict domains when processing untrusted Markdown input is affected.Patches
This has been patched in version 2.8.2. The fix replaces the regex-based domain check with explicit hostname parsing using
parse_url(), ensuring exact domain and subdomain matching only.Workarounds
Embedextension, or restrict its use to trusted usersEmbedAdapterInterfaceCVE-2026-30838
Impact
The
DisallowedRawHtmlextension can be bypassed by inserting a newline, tab, or other ASCII whitespace character between a disallowed HTML tag name and the closing>. For example,<script\n>would pass through unfiltered and be rendered as a valid HTML tag by browsers. This is a cross-site scripting (XSS) vector for any application that relies on this extension to sanitize untrusted user input.All applications using the
DisallowedRawHtmlextension to process untrusted markdown are affected. Applications that use a dedicated HTML sanitizer (such as HTML Purifier) on the rendered output are not affected.Patches
Fixed in 2.8.1. The regex character class
[ \/>]was changed to[\s\/>]to match all whitespace characters that browsers accept as valid tag name terminators.Workarounds
html_inputconfiguration option to'escape'or'strip'to disable all raw HTML, though this is a broader restriction than theDisallowedRawHtmlextension provides.Release Notes
thephpleague/commonmark (league/commonmark)
v2.8.2Compare Source
This is a security release to address an issue where the
allowed_domainssetting for theEmbedextension can be bypassed, resulting in a possible SSRF and XSS vulnerabilities.Fixed
DomainFilteringAdapterhostname boundary bypass where domains likeyoutube.com.evilcould match an allowlist entry foryoutube.com(GHSA-hh8v-hgvp-g3f5)v2.8.1Compare Source
This is a security release to address an issue where
DisallowedRawHtmlcan be bypassed, resulting in a possible cross-site scripting (XSS) vulnerability.Fixed
DisallowedRawHtmlRenderernot blocking raw HTML tags with trailing ASCII whitespace (GHSA-4v6x-c7xx-hw9f)v2.8.0Compare Source
Added
HighlightExtensionfor marking important text using==syntax (#1100)Fixed
AutolinkExtensionincorrectly matching URLs after invalidwww.prefix (#1095, #1103)Configuration
📅 Schedule: Branch creation - "" in timezone UTC, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
Read more information about the use of Renovate Bot within Laminas.