docs/running_psalm/issues/TaintedTextWithQuotes.md
Emitted when user-controlled input that can contain quotation marks can be passed into an echo statement.
This could lead to a potential Cross Site Scripting (XSS) vulnerability. Using an XSS vulnerability, an attacker could inject malicious JavaScript and execute any action JavaScript could do. Examples include:
Whether this is exploitable or not depends on a few conditions:
text/html)Content-Disposition)<?php
$param = strip_tags($_GET['param']);
?>
<script>
console.log('<?=$param?>')
</script>
Passing ');alert('injection');// as a GET param here would cause the alert to trigger.
htmlentities with the ENT_QUOTES flag or use an allowlist.HTTPOnly.