jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3230-1 | jqueryui security update |
Debian DLA |
DLA-3551-1 | otrs2 security update |
Github GHSA |
GHSA-gpqq-952q-5327 | XSS in the `of` option of the `.position()` util in jquery-ui |
Ubuntu USN |
USN-5181-1 | jQuery UI vulnerability |
Ubuntu USN |
USN-6419-1 | jQuery UI vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 04 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-04T16:09:17.971Z
Reserved: 2021-09-15T00:00:00.000Z
Link: CVE-2021-41184
No data.
Status : Modified
Published: 2021-10-26T15:15:10.460
Modified: 2025-11-04T16:15:43.353
Link: CVE-2021-41184
OpenCVE Enrichment
No data.
Debian DLA
Github GHSA
Ubuntu USN