solid-js is a declarative, efficient, and flexible JavaScript library for building user interfaces. In affected versions Inserts/JSX expressions inside illegal inlined JSX fragments lacked escaping, allowing user input to be rendered as HTML when put directly inside JSX fragments. This issue has been addressed in version 1.9.4 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 21 Feb 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | solid-js is a declarative, efficient, and flexible JavaScript library for building user interfaces. In affected versions Inserts/JSX expressions inside illegal inlined JSX fragments lacked escaping, allowing user input to be rendered as HTML when put directly inside JSX fragments. This issue has been addressed in version 1.9.4 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | |
| Title | Lack of Escaping of HTML in JSX Fragments allows for Cross-site Scripting in solid-js | |
| Weaknesses | CWE-116 CWE-79 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-02-21T21:12:58.218Z
Updated: 2025-02-24T17:05:00.409Z
Reserved: 2025-02-18T16:44:48.766Z
Link: CVE-2025-27109
Updated: 2025-02-24T17:04:56.480Z
Status : Received
Published: 2025-02-21T22:15:14.303
Modified: 2025-02-24T17:15:14.850
Link: CVE-2025-27109
No data.