Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could exploit this vulnerability to gather details about the file system structure and dependencies of the targeted server.
https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-6256334
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6276557
https://github.com/apostrophecms/sanitize-html/pull/650
https://github.com/apostrophecms/sanitize-html/commit/c5dbdf77fe8b836d3bf4554ea39edb45281ec0b4
https://github.com/apostrophecms/apostrophe/discussions/4436
https://gist.github.com/Slonser/8b4d061abe6ee1b2e10c7242987674cf