Log injection High

User-provided inputs must be sanitized before they are logged. An attacker can use unsanitized input to break a log's integrity, forge log entries, or bypass log monitors.

Detector ID
javascript/log-injection@v1.0
Category
Common Weakness Enumeration (CWE) external icon