-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| MapProxy | pip | < 1.11.1 | 1.11.1 |
The vulnerability stems from improper input sanitization in the demo service's JavaScript examples. The patch replaced xml.sax.saxutils.escape with a custom escape() function that adds quote neutralization. The original escape function only handled &, <, > but not quotes, leaving parameters like 'format' and 'srs' vulnerable when rendered in JS contexts (e.g., in template literals or event handlers). This matches the XSS pattern (CWE-79) described in the advisory.