solid-js is a declarative, efficient, and flexible JavaScript library for building user interfaces. In affected versions Inserts/JSX expressions inside illegal inlined JSX fragments lacked escaping, allowing user input to be rendered as HTML when put directly inside JSX fragments. This issue has been addressed in version 1.9.4 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-5079 | Solid Lacks Escaping of HTML in JSX Fragments allows for Cross-Site Scripting (XSS) |
Github GHSA |
GHSA-3qxh-p7jc-5xh6 | Solid Lacks Escaping of HTML in JSX Fragments allows for Cross-Site Scripting (XSS) |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 24 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 21 Feb 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | solid-js is a declarative, efficient, and flexible JavaScript library for building user interfaces. In affected versions Inserts/JSX expressions inside illegal inlined JSX fragments lacked escaping, allowing user input to be rendered as HTML when put directly inside JSX fragments. This issue has been addressed in version 1.9.4 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | |
| Title | Lack of Escaping of HTML in JSX Fragments allows for Cross-site Scripting in solid-js | |
| Weaknesses | CWE-116 CWE-79 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-24T17:05:00.409Z
Reserved: 2025-02-18T16:44:48.766Z
Link: CVE-2025-27109
Updated: 2025-02-24T17:04:56.480Z
Status : Received
Published: 2025-02-21T22:15:14.303
Modified: 2025-02-24T17:15:14.850
Link: CVE-2025-27109
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA