CVE-2020-11023
MEDIUM KEVjQuery <3.5.0 - XSS
Title source: llmDescription
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Exploits (7)
exploitdb
WORKING POC
by Central InfoSec · textwebappsmultiple
https://www.exploit-db.com/exploits/49767
github
WORKING POC
by CoderDias · poc
https://github.com/CoderDias/CVE-POCs/tree/main/CVE-2020-11023
nomisec
WRITEUP
by andreassundstrom · poc
https://github.com/andreassundstrom/cve-2020-11023-demonstration
References (67)
... and 47 more
Scores
CVSS v3
6.9
EPSS
0.5892
EPSS Percentile
98.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N
Details
CISA KEV
2025-01-23
VulnCheck KEV
2021-01-21
InTheWild.io
2021-07-30
ENISA EUVD
EUVD-2020-0387
CWE
CWE-79
Status
published
Products (48)
components/jquery
1.0.3 - 3.5.0Packagist
debian/debian_linux
9.0
drupal/drupal
7.0 - 7.70
fedoraproject/fedora
31
fedoraproject/fedora
32
fedoraproject/fedora
33
jquery/jquery
1.0.3 - 3.5.0
netapp/active_iq_unified_manager
(3 CPE variants)
netapp/cloud_backup
netapp/cloud_insights_storage_workload_security_agent
... and 38 more
Published
Apr 29, 2020
KEV Added
Jan 23, 2025
Tracked Since
Feb 18, 2026