High severityOSV Advisory· Published Jan 8, 2026· Updated Jan 8, 2026
Salvo is vulnerable to stored XSS in the list_html function by uploading files with malicious names
CVE-2026-22257
Description
Salvo is a Rust web backend framework. Prior to version 0.88.1, the function list_html generates a file view of a folder without sanitizing the files or folders names, this may potentially lead to XSS in cases where a website allow the access to public files using this feature and anyone can upload a file. This issue has been patched in version 0.88.1.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
salvocrates.io | < 0.88.1 | 0.88.1 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-54m3-5fxr-2f3jghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-22257ghsaADVISORY
- github.com/salvo-rs/salvo/blob/16efeba312a274739606ce76366d921768628654/crates/serve-static/src/dir.rsghsax_refsource_MISCWEB
- github.com/salvo-rs/salvo/security/advisories/GHSA-54m3-5fxr-2f3jghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.