Direct User Input in Response
User input from request parameters, body, or headers is directly written to the response without escaping.
XSS vulnerability in Express.js applications where user-controlled data is directly written to the HTTP response using response.write() or response.end() without proper escaping, allowing script injection into the rendered page.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
User input from request parameters, body, or headers is directly written to the response without escaping.
Sourcery automatically identifies cross-site scripting (xss) via express.js response.write() with user data and many other security issues in your codebase.