### [CVE-2024-42515](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42515) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Glossarizer through 1.5.2 improperly tries to convert text into HTML. Even though the application itself escapes special characters (e.g., <>), the underlying library converts these encoded characters into legitimate HTML, thereby possibly causing stored XSS. Attackers can append a XSS payload to a word that has a corresponding glossary entry. ### POC #### Reference - https://herolab.usd.de/security-advisories/usd-2024-0011/ #### Github No PoCs found on GitHub currently.