6.11.4
6.11.4: Mitigates security vulnerability where maliciously crafted markdown links could use data:
or vbscript:
urls to trigger an xss injection ( #306 / https://www.npmjs.com/advisories/1219 ), even when using options.disableParsingRawHTML
Note that currently, the default options.disableParsingRawHTML = false
should still only be used for trusted input, as arbitrary html, including script tags.
6.11.3 has no changes (I held the publish script upside down; the only change from 6.11.2 is the version number 😅)