Loading HuntDB...

GHSA-jpcq-cgw6-v4j6

GitHub Security Advisory

Potential XSS vulnerability in jQuery

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

### Impact
Passing HTML containing `<option>` elements from untrusted sources - even after sanitizing them - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code.

### Patches
This problem is patched in jQuery 3.5.0.

### Workarounds
To workaround this issue without upgrading, use [DOMPurify](https://github.com/cure53/DOMPurify) with its `SAFE_FOR_JQUERY` option to sanitize the HTML string before passing it to a jQuery method.

### References
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/

### For more information
If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery repo](https://github.com/jquery/jquery/issues). If you don't find an answer, open a new issue.

Affected Packages

npm jquery
Affected versions: 1.0.3 (fixed in 3.5.0)
RubyGems jquery-rails
Affected versions: 0 (fixed in 4.4.0)
NuGet jQuery
Affected versions: 1.0.3 (fixed in 3.5.0)
Maven org.webjars.npm:jquery
Affected versions: 1.0.3 (fixed in 3.5.0)
Packagist components/jquery
Affected versions: 1.0.3 (fixed in 3.5.0)

Related CVEs

Key Information

GHSA ID
GHSA-jpcq-cgw6-v4j6
Published
April 29, 2020 10:19 PM
Last Modified
January 31, 2025 8:50 PM
CVSS Score
5.0 /10
Primary Ecosystem
npm
Primary Package
jquery
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 30, 2025 6:30 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.