Medium severity6.1NVD Advisory· Published Apr 8, 2026· Updated Apr 16, 2026
CVE-2026-32289
CVE-2026-32289
Description
Context was not properly tracked across template branches for JS template literals, leading to possibly incorrect escaping of content when branches were used. Additionally template actions within JS template literals did not properly track the brace depth, leading to incorrect escaping being applied. These issues could cause actions within JS template literals to be incorrectly or improperly escaped, leading to XSS vulnerabilities.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- go.dev/cl/763762nvdPatch
- pkg.go.dev/vuln/GO-2026-4865nvdVendor Advisory
- go.dev/issue/78331nvdIssue Tracking
- groups.google.com/g/golang-announce/c/0uYbvbPZRWUnvdRelease NotesMailing List
News mentions
0No linked articles in our index yet.