We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Reserved 2020-03-30 | Published 2020-04-29 | Updated 2025-01-23 | Assigner GitHub_MDate added 2025-01-23 | Due date 2025-02-13
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
www.debian.org/security/2020/dsa-4693 (DSA-4693)
lists.fedoraproject.org/...QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/ (FEDORA-2020-36d2db5f51)
www.oracle.com/security-alerts/cpujul2020.html
security.netapp.com/advisory/ntap-20200511-0006/
www.drupal.org/sa-core-2020-002
github.com/...jquery/security/advisories/GHSA-jpcq-cgw6-v4j6
blog.jquery.com/2020/04/10/jquery-3-5-0-released
lists.opensuse.org/...ecurity-announce/2020-07/msg00067.html (openSUSE-SU-2020:1060)
security.gentoo.org/glsa/202007-03 (GLSA-202007-03)
lists.opensuse.org/...ecurity-announce/2020-07/msg00085.html (openSUSE-SU-2020:1106)
lists.apache.org/...3688fbcc21f06ec@
lists.apache.org/...ec8855d60a0dd13248@
lists.apache.org/...8a151d4cb0b3b15@
lists.apache.org/...01667675af6721c@
lists.apache.org/...e8806b59812a8ea@
lists.apache.org/...fc5a63ba7dee8c9@
lists.apache.org/...6af41d4e9dbed49@
lists.apache.org/...5d73fc113ded8e7@
lists.apache.org/...e25b12baa8fc7c5@
lists.apache.org/...ad40dd428ce8f72@
lists.apache.org/...d94757878320d61@
lists.apache.org/...08e997e088e7a93@
lists.apache.org/...0e2937ef8417fac@
lists.fedoraproject.org/...SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/ (FEDORA-2020-fbb94073a1)
lists.fedoraproject.org/...AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/ (FEDORA-2020-0b32a59b54)
lists.apache.org/...8a99022f15274c6@
lists.apache.org/...5ada523c3401d9@
lists.apache.org/...f21cac2303463b1@
lists.apache.org/...3ef951ddac4918c@
lists.apache.org/...e9138d07e86ebbb@
lists.fedoraproject.org/...SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/ (FEDORA-2020-fe94df8c34)
lists.apache.org/...01e1d75a2b0679@
www.oracle.com/security-alerts/cpuoct2020.html
lists.apache.org/...e679c11c609e2d@
lists.apache.org/...d3bce56b48c0ffa67@
lists.opensuse.org/...ecurity-announce/2020-11/msg00039.html (openSUSE-SU-2020:1888)
lists.apache.org/...011ff00b8b1f48@
lists.apache.org/...a1819d311ba4f5330@
lists.apache.org/...5dcce374112ed6e16@
lists.apache.org/...baba981a8dbd9c9ef@
lists.apache.org/...736abae0cc7625fe6@
lists.apache.org/...8ebd7bd750844898e@
lists.apache.org/...88898c372ac807817@
lists.apache.org/...4a487c4ea247c@
lists.apache.org/...1f2d4871012141494@
www.oracle.com/security-alerts/cpujan2021.html
lists.apache.org/...f6326d2956735c@
lists.apache.org/...df5d73c49a0760@
lists.debian.org/debian-lts-announce/2021/03/msg00033.html ([debian-lts-announce] 20210326 [SECURITY] [DLA 2608-1] jquery security update)
lists.apache.org/...059f3965b3fce2@
lists.apache.org/...f2b4eabeaae5e4@
lists.apache.org/...5f31c2e7d977ae@
lists.apache.org/...0a2bf6e2f8d108@
www.oracle.com/security-alerts/cpuApr2021.html
www.tenable.com/security/tns-2021-10
www.tenable.com/security/tns-2021-02
packetstormsecurity.com/...y-1.0.3-Cross-Site-Scripting.html
www.oracle.com//security-alerts/cpujul2021.html
www.oracle.com/security-alerts/cpuoct2021.html
lists.apache.org/...9d780dc1cc7d36@
www.oracle.com/security-alerts/cpujan2022.html
www.oracle.com/security-alerts/cpuapr2022.html
www.oracle.com/security-alerts/cpujul2022.html
lists.debian.org/debian-lts-announce/2023/08/msg00040.html ([debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update)
Support options