solid-js is a declarative, efficient, and flexible JavaScript library for building user interfaces. In affected versions Inserts/JSX expressions inside illegal inlined JSX fragments lacked escaping, allowing user input to be rendered as HTML when put directly inside JSX fragments. This issue has been addressed in version 1.9.4 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Mon, 24 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 21 Feb 2025 21:30:00 +0000

Type Values Removed Values Added
Description solid-js is a declarative, efficient, and flexible JavaScript library for building user interfaces. In affected versions Inserts/JSX expressions inside illegal inlined JSX fragments lacked escaping, allowing user input to be rendered as HTML when put directly inside JSX fragments. This issue has been addressed in version 1.9.4 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Title Lack of Escaping of HTML in JSX Fragments allows for Cross-site Scripting in solid-js
Weaknesses CWE-116
CWE-79
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-02-24T17:05:00.409Z

Reserved: 2025-02-18T16:44:48.766Z

Link: CVE-2025-27109

cve-icon Vulnrichment

Updated: 2025-02-24T17:04:56.480Z

cve-icon NVD

Status : Received

Published: 2025-02-21T22:15:14.303

Modified: 2025-02-24T17:15:14.850

Link: CVE-2025-27109

cve-icon Redhat

No data.