solid-js is a declarative, efficient, and flexible JavaScript library for building user interfaces. In affected versions Inserts/JSX expressions inside illegal inlined JSX fragments lacked escaping, allowing user input to be rendered as HTML when put directly inside JSX fragments. This issue has been addressed in version 1.9.4 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 21 Feb 2025 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | solid-js is a declarative, efficient, and flexible JavaScript library for building user interfaces. In affected versions Inserts/JSX expressions inside illegal inlined JSX fragments lacked escaping, allowing user input to be rendered as HTML when put directly inside JSX fragments. This issue has been addressed in version 1.9.4 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | |
Title | Lack of Escaping of HTML in JSX Fragments allows for Cross-site Scripting in solid-js | |
Weaknesses | CWE-116 CWE-79 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-24T17:05:00.409Z
Reserved: 2025-02-18T16:44:48.766Z
Link: CVE-2025-27109

Updated: 2025-02-24T17:04:56.480Z

Status : Received
Published: 2025-02-21T22:15:14.303
Modified: 2025-02-24T17:15:14.850
Link: CVE-2025-27109

No data.