[From nobody Sun Apr 26 20:29:04 2026
Received: (at submit) by bugs.debian.org; 18 Jan 2025 19:29:05 +0000
X-Spam-Checker-Version: SpamAssassin 3.4.6-bugs.debian.org_2005_01_02
 (2021-04-09) on buxtehude.debian.org
X-Spam-Level: 
X-Spam-Status: No, score=-9.5 required=4.0 tests=BAYES_00, FOURLA,
 FROMDEVELOPER, 
 KHOP_HELO_FCRDNS,MD5_SHA1_SUM,RDNS_DYNAMIC,SPF_HELO_NONE,SPF_NONE,
 XMAILER_REPORTBUG autolearn=ham autolearn_force=no
 version=3.4.6-bugs.debian.org_2005_01_02
X-Spam-Bayes: score:0.0000 Tokens: new, 32; hammy, 149; neutral, 48; spammy,
 1. spammytokens:0.944-+--H*r:bugs.debian.org
 hammytokens:0.000-+--H*F:U*carnil, 0.000-+--XDebbugsCc,
 0.000-+--X-Debbugs-Cc, 0.000-+--H*M:reportbug, 0.000-+--H*MI:reportbug
Return-path: &lt;carnil@debian.org&gt;
Received: from c-82-192-244-13.customer.ggaweb.ch ([82.192.244.13]:49240
 helo=eldamar.lan) by buxtehude.debian.org with esmtp (Exim 4.94.2)
 (envelope-from &lt;carnil@debian.org&gt;) id 1tZEVE-0056dI-Uu
 for submit@bugs.debian.org; Sat, 18 Jan 2025 19:29:05 +0000
Content-Type: text/plain; charset=&quot;us-ascii&quot;
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Salvatore Bonaccorso &lt;carnil@debian.org&gt;
To: Debian Bug Tracking System &lt;submit@bugs.debian.org&gt;
Subject: node-katex: CVE-2025-23207
Message-ID: &lt;173722854164.3405384.14297276159247289798.reportbug@eldamar.lan&gt;
X-Mailer: reportbug 13.0.2
Date: Sat, 18 Jan 2025 20:29:01 +0100
Delivered-To: submit@bugs.debian.org

Source: node-katex
Version: 0.16.10+~cs6.1.0-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil@debian.org, Debian Security Team &lt;team@security.debian.org&gt;

Hi,

The following vulnerability was published for node-katex.

CVE-2025-23207[0]:
| KaTeX is a fast, easy-to-use JavaScript library for TeX math
| rendering on the web. KaTeX users who render untrusted mathematical
| expressions with `renderToString` could encounter malicious input
| using `\htmlData` that runs arbitrary JavaScript, or generate
| invalid HTML. Users are advised to upgrade to KaTeX v0.16.21 to
| remove this vulnerability. Users unable to upgrade should avoid use
| of or turn off the `trust` option, or set it to forbid `\htmlData`
| commands, forbid inputs containing the substring `&quot;\\htmlData&quot;` and
| sanitize HTML output from KaTeX.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities &amp; Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-23207
    https://www.cve.org/CVERecord?id=CVE-2025-23207
[1] https://github.com/KaTeX/KaTeX/security/advisories/GHSA-cg87-wmx4-v546
[2] https://github.com/KaTeX/KaTeX/commit/ff289955e81aab89086eef09254cbf88573d415c

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
]