Parsing arbitrary HTML which is then rendered using Render can result in an unexpected HTML tree. This can be leveraged to execute XSS attacks in applications that attempt to sanitize input HTML before rendering.CreditsensyReferenceshttps://go.dev/issue/79571https://groups.google.com/g/golang-announce/c/iI-mYSI0lu8https://go.dev/cl/781700https://pkg.go.dev/vuln/GO-2026-5025