Promptcraft Forge Studio is a toolkit for evaluating, optimizing, and maintaining  LLM-powered applications. All versions of Promptcraft Forge Studio sanitize user input using regex blacklists such as r`eplace(/javascript:/gi, '')`. Because the package uses multi-character tokens and each replacement is applied only once, removing one occurrence can create a new dangerous token due to overlap. The “sanitized” value may still contain an executable payload when used in href/src (or injected into the DOM). There is currently no fix for this issue.
                
            Metrics
Affected Vendors & Products
References
        History
                    Fri, 05 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Promptcraft-forge-studio Project Promptcraft-forge-studio Project promptcraft-forge-studio | |
| Vendors & Products | Promptcraft-forge-studio Project Promptcraft-forge-studio Project promptcraft-forge-studio | 
Thu, 04 Sep 2025 21:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Thu, 04 Sep 2025 19:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Promptcraft Forge Studio is a toolkit for evaluating, optimizing, and maintaining LLM-powered applications. All versions of Promptcraft Forge Studio sanitize user input using regex blacklists such as r`eplace(/javascript:/gi, '')`. Because the package uses multi-character tokens and each replacement is applied only once, removing one occurrence can create a new dangerous token due to overlap. The “sanitized” value may still contain an executable payload when used in href/src (or injected into the DOM). There is currently no fix for this issue. | |
| Title | Promptcraft Forge Studio: Complete Sanitizer Bypass Enables XSS via Overlapping Patterns | |
| Weaknesses | CWE-184 CWE-20 CWE-79 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-04T20:13:09.147Z
Reserved: 2025-08-29T16:19:59.010Z
Link: CVE-2025-58353
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-09-04T20:13:03.273Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-09-04T20:15:39.420
Modified: 2025-09-05T17:47:10.303
Link: CVE-2025-58353
 Redhat
                        Redhat
                    No data.