Actually, for field forwarding, there is a mismatch between the div id given at python side and the id at javascript side. At python side the widget id is not read at the right place.
In the PR there is a very quick fix for that.
There is also a XSS exploit possible in select2.js when displaying selected item : it requires to be escaped.
Actually, for field forwarding, there is a mismatch between the div
id
given at python side and theid
at javascript side. At python side the widgetid
is not read at the right place.In the PR there is a very quick fix for that.
There is also a XSS exploit possible in select2.js when displaying selected item : it requires to be escaped.