This affects all versions of package osm-static-maps. User input given to the package is passed directly to a template without escaping ({{{ ... }}}). As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. It will be outputted as an HTML on the page which gives opportunity for XSS or rendered on the server (puppeteer) which also gives opportunity for SSRF and Local File Read.
                
            Metrics
Affected Vendors & Products
References
        History
                    No history.
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: snyk
Published: 2020-10-20T10:25:26.929315Z
Updated: 2024-09-16T16:28:47.401Z
Reserved: 2020-01-21T00:00:00
Link: CVE-2020-7749
 Vulnrichment
                        Vulnrichment
                    No data.
 NVD
                        NVD
                    Status : Modified
Published: 2020-10-20T11:15:12.660
Modified: 2024-11-21T05:37:43.837
Link: CVE-2020-7749
 Redhat
                        Redhat
                    No data.