Phlex XSS protection bypass via attribute splatting, dynamic tags, and href values
Package
Affected versions
>= 2.4.0.beta1, < 2.4.1
>= 2.3.0, < 2.3.2
>= 2.2.0, < 2.2.2
>= 2.1.0, < 2.1.3
>= 2.0.0.beta1, < 2.0.2
< 1.11.1
Patched versions
2.4.1
2.3.2
2.2.2
2.1.3
2.0.2
1.11.1
Description
Published to the GitHub Advisory Database
Feb 6, 2026
Reviewed
Feb 6, 2026
Last updated
Feb 6, 2026
Impact
During a security audit conducted with Claude Opus 4.6 and GPT-5.3-Codex, we identified three specific ways to bypass the XSS (cross-site-scripting) protection built into Phlex.
div(**user_attributes).tagmethod, e.g.tag(some_tag_name_from_user).hrefattributes, e.g.a(href: user_provided_link).All three of these patterns are meant to be safe and all have now been patched.
Patches
Phlex has patched all three issues and introduced new tests that run against Safari, Firefox and Chrome.
The patched versions are:
Phlex has also patched the
mainbranch in GitHub.Workarounds
If a project uses a secure CSP (content security policy) or if the application doesn’t use any of the above patterns, it is not at risk.
References