# REPRO-2026-00067: Svelte XSS via textarea bind:value in SSR ## Summary Status: published Severity: high Type: security Confidence: Unknown ## Identifiers REPRO ID: REPRO-2026-00067 GHSA: GHSA-gw32-9rmw-qwww ## Package Name: svelte Ecosystem: npm Affected: Unknown Fixed: Unknown ## Root Cause ## Summary Server-side rendering of `` without escaping special characters. Because `` sequence in `logs/ssr-output.html`; exit `1` means the payload was not observed. ## Evidence - **Run log:** `logs/reproduction.log` – shows Node (`v22.21.1`) and npm (`10.9.4`) versions, dependency installation, SSR execution, and the final "VULNERABILITY REPRODUCED" message. - **SSR output:** `logs/ssr-output.html` contains ``, proving that hostile script tags are emitted unescaped. - **Install log:** `logs/npm-install.log` documents dependency installation for auditability. ## Recommendations / Next Steps - Upgrade Svelte to version `3.59.2` or later (or the latest 4.x release) where textarea values are escaped during SSR. - If upgrading is not immediately possible, manually escape user-controlled textarea values before SSR or avoid binding raw user data to `` substrings and quotes. - Re-scan dependent applications for additional SSR contexts (e.g., `