CVE-2020-11022
MEDIUM EXPLOITED IN THE WILDjQuery <3.5.0 - XSS
Title source: llmDescription
In jQuery starting with 1.12.0 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Exploits (7)
exploitdb
WORKING POC
by Central InfoSec · textwebappsmultiple
https://www.exploit-db.com/exploits/49766
nomisec
WORKING POC
34 stars
by 0xAJ2K · client-side
https://github.com/0xAJ2K/CVE-2020-11022-CVE-2020-11023
github
WORKING POC
by CoderDias · poc
https://github.com/CoderDias/CVE-POCs/tree/main/CVE-2020-11022
References (71)
... and 51 more
Scores
CVSS v3
6.9
EPSS
0.0704
EPSS Percentile
91.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N
Details
VulnCheck KEV
2021-01-21
InTheWild.io
2021-07-30
CWE
CWE-79
Status
published
Products (50)
athlon1600/youtube-downloader
0Packagist
components/jquery
1.2.0 - 3.5.0Packagist
debian/debian_linux
9.0
drupal/drupal
7.0 - 7.70
fedoraproject/fedora
31
fedoraproject/fedora
32
fedoraproject/fedora
33
jquery/jQuery
>= 1.12.0, < 3.5.0
jquery/jquery
1.2 - 3.5.0
maximebf/debugbar
0 - 1.19.0Packagist
... and 40 more
Published
Apr 29, 2020
Tracked Since
Feb 18, 2026