docs/running_psalm/issues/TaintedHtml.md
Emitted when user-controlled input that can contain HTML can be passed into an echo statement.
This could lead to a potential Cross Site Scripting (XSS) vulnerability. Using an XSS vulnerability, an attacker could inject malicious JavaScript and execute any action JavaScript could do. Examples include:
Whether this is exploitable or not depends on a few conditions:
text/html)Content-Disposition)<?php
$name = $_GET["name"];
printName($name);
function printName(string $name) {
echo $name;
}
htmlentities or use an allowlist.HTTPOnly.