This code is vulnerable to a XSS attack.
For example if the name of a school in OSM is changed to <script>alert("PWND")</script> then your page will happily inject the JS into the page.
A naive solution to this is to just remove all “<” and “>” from the school.tags.name
1 Like