Leaflet versions up to and including 1.9.4 are vulnerable to Cross-Site Scripting (XSS) via the bindPopup() method. This method renders user-supplied input as raw HTML without sanitization, allowing attackers to inject arbitrary JavaScript code through event handler attributes (e.g., <img src=x onerror="alert('XSS')">). When a victim views an affected map popup, the malicious script executes in the context of the victim's browser session.
0.7.3~dfsg-10.7.7+20160312-11.5.1~dfsg-11.5.1~dfsg-21.6.0~dfsg-11.7.1~dfsg-21.7.1~dfsg-41.7.1~dfsg-51.7.1~dfsg-61.7.1~dfsg-7Exploitability
AV:NAC:LPR:NUI:RScope
S:CImpact
C:LI:LA:NCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N