Unescaped URL Query Parameters
URL query parameters are directly inserted into HTTP responses without HTML escaping.
XSS vulnerability in Go net/http applications where untrusted URL query parameters are formatted into HTTP responses using fmt.Printf-style functions without HTML escaping, allowing raw HTML/JavaScript injection that can execute attacker-controlled scripts in user browsers.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
URL query parameters are directly inserted into HTTP responses without HTML escaping.
Sourcery automatically identifies cross-site scripting (xss) from url query data in responsewriter formatting in net/http handler and many other security issues in your codebase.